HITBSecConf2006 Presentation - MOSREF: Using Cryptography and Injectable Virtual Machines in Security.
6ebc0677ca036a5bb4b4aa391d01ce08011f2ef6428bbe899715080b876373fd
HITBSecConf2006 Presentation - VoIPhreaking: SIPhallis Unveiled.
55819f64fc30085e3548f1fc45e1d9c7671876304111e31b58763ce476b15121
HITBSecConf2006 Presentation - Smashing the Stack for Profit - Period.
cd74f7befdf12c7c088085b1801eab1d242650db7f86d39c152344ae7ac1c34b
HITBSecConf2006 Presentation - The Biggest Brother.
593d5a78bfc5e29cff64ec5f6f7464f848eec1f59121378c7b9beb514ba9c92b
HITBSecConf2006 Presentation - A New Approach to Cybercrime: The Hackers Profiling Project (HPP).
fe422b6eba9e7e5be46710ece591e7835f71c06b0b869e4a607fae76beccd956
HITBSecConf2006 Presentation - Scapy and IPv6 networking.
432effb8942d5cd534cb10fa92aa8d8d8bdba7f14a3def904ec9cb85f3f03970
HITBSecConf2006 Presentation - Finding Secrets in ISAPI.
bc0314b2e692a9f545d86a278fbf1b1fff9a3394cf2ad0abb846888a1a402087
HITBSecConf2006 Presentation - Towards an Invisible Honeypot Monitoring System.
4a9b4c63d47b9b96eea0f12e6cefc0b433c2b7fae81bd20cbb93d36c468cfef6
HITBSecConf2006 Presentation - Subverting the Vista Kernel For Fun And Profit.
166ba047155514bdbc82f9186d41dca4b8e72f60d2b133a6a00d0de888f89ac7
HITBSecConf2006 Presentation - Hacking a Bird in The Sky: Hijacking VSAT Connections.
6825e8ca8ed3d1a6b4854ce53a2b77dc9b5e8ab847b0ca259814c15bda9a296b
HITBSecConf2006 Presentation - Yet Another Web Application Testing Toolkit (YAWATT).
a35cbde25a9caa5e6325a5bfbf04887f6e92677113767b8f0aa24425004a6546
HITBSecConf2006 Presentation - Pen Testing Windows Vista BitLocker Drive Encryption from the Inside.
4822a2f724006e0f086e1a06406715d251d3413ffb397714cdb96f08aaaa61db
HITBSecConf2006 Presentation - Using Neural Networks and Statistical Machinery to improve remote OS Detection.
f2bfc2dd5a19b97cfc08c5d4ca6b863421a578144924c59002dbe2073a9c2988
HITBSecConf2006 Presentation - Hacking Trust.
2fa82b2554f0fbdc178846a7f5b08c355c6c8c07004ef47867948000887ef342
HITBSecConf2006 Presentation - Triple Play; Triple Threat? IPTV Security.
c764b639948e9110979699a66aa8e598faeb1fc139e4655df45d28a722372546
HITBSecConf2006 Presentation - Playing with Botnets for Fun and Profit.
51d51cc83f425fde075909c905fd790df452d01bea3767f829de5a800ab74503
HITBSecConf2006 Presentation - Writing Metasploit Plugins - From Vulnerability to Exploit.
faacdb406725440eeb2a40eb8ed68e7558e0296a14eb29da2e4d26a408c8b99c
HITBSecConf2006 Presentation - Taming Bugs: The Art and Science of Writing Secure Code.
72014f096a260f225fff5afa279f799a8e830f8170f7fbef7b2c8b35f1086e16
HITBSecConf2006 Presentation - Client Honeypots - Its Not Only The Network.
e330bb5cd0ddf943f40890e4bda401671766859f0c31edeef80c1b2dfb8d4029
HITBSecConf2006 Presentation - Pentesting Java/J2EE - Discovering Remote Holes.
1415cf54b295ce5b73fb813b0ebf680add2c464363512687c557911aa8ecc12a
HITBSecConf2006 Presentation - The world through the eyes of a signature developer.
65cb5fc1c76ff202d050fe25ff1250d0ec851c89acc3600715810a5e0ddd4fb7
HITBSecConf2006 Presentation - Security Engineering in Windows Vista.
a7f1f2504679e3b5e20316cb55913e40eb67172e2995c9cf14553c94ff67ce12
HITBSecConf2006 Presentation - NAIPS/AAIPS - A New Approach to Protecting Your Data.
bfc21ec5768df5cbf18e7472b8decd4c5a897cbcf8a3ba0016ea8764390086ab
HITBSecConf2006 Presentation - Discussion of the X.805 Standard.
060abe7a401ce7d3dbb445e80dfe3e9d1bc45e22062d16a6a8115d37bca4fa9b
HITBSecConf2006 Presentation - What application security tools vendors dont want you to know and holes they will never find!
565e1e3b88632ae0122d2200a59eda6fec8c0e3a0c5a35dc3546d8ede2da7f4e