Amitpal Dhillon – Addressing Identity Management.pdf 3.7M
Dino Dai Zovi – Mac OS Xploitation.pdf 623K
Ero Carrera – Analysis and Visualization of Common Packers.pdf 3.7M
Hernan Ochoa – Pass-The-Hash Toolkit for Windows.pdf 535K
Jim Geovedi – Hacking a Bird in the Sky 2.0.pdf 3.1M
Julian Ho – Moocherhunter.pdf 124K
Peter Silberman – Full Process Reconstitution from Memory.pdf 144K
Alexander Tereshkin – Bluepilling the Xen Hypervisor.pdf 8.3M
Alexander Tereshkin – Bluepilling the Xen Hypervisor Demo (Large File) 142M
Eric Lawrence – IE 8 – Engineering a Trustworthy Browser.pdf 13M
Jonathan Squire – A Fox in the Hen House.pdf 3.5M
Paul Craig – Hacking Internet Kiosks.pdf 1.2M
Roberto Preatoni – Time for a Free Hardware Foundation.pdf 11M
Saumil Shah – Browser Exploits – A New Model for Browser Security.pdf 2.1M
The Grugq – How the Leopard Hides His Spots.pdf 01-Nov-2008 12:39 128K
Mel Mudin and Lee – Advanced Network Forensics Lab Demo (Large File) 29M
Charlie Miller – iPwning the iPhone.pdf 9.8M
Charl van Der Walt – Pushing the Camel Through the Eye of a Needle.pdf 23M
Ilfak Guilfanov – Decompilers and Beyond.pdf 418K
Kris Kaspersky – Remote Code Execution Through Intel CPU Bugs.pdf 1.3M
Petko D Petkov – Client Side Security.pdf 1.0M
AR Samhuri – Next Generation Reverse Shell.pdf 7.7M
Adrian Pastor – Cracking into Embedded Devices and Beyond.pdf 889K
Mary Yeoh – Security Penetration Testing at RTL Level.pdf 4.4M
Matthew Geiger – How to Build Your Own Password Cracker and Disassembler.pdf 471K
Shreeraj Shah – Top 10 Web 2.0 Attacks.pdf 1.1M
Advanced Wireless Lab (Very Large File) 1.2G
Ching Tim Meng – Detecting and Removing Malware without Antivirus Software.pdf 321K
KEYNOTE 1 – Jeremiah Grossman – The Art of Click-Jacking.pdf 2.5M
KEYNOTE 2 – Marcus Ranum – Cyberwar is Bullshit.pdf 54K
KEYNOTE 3 + 4 – The Pirate Bay Dissolving a Billion Dollar Industry as a Hobby.zip 38M