| Parent
Directory/ |
|
- |
Directory |
| RECON2008.thumbs/ |
2008-Jul-20 15:34:05 |
- |
Directory |
| RECON2008-T01_Pierre-Marc_Bureau-How_I_learned_Reverse_Engineering_with_Storm.avi |
2008-Jul-19 17:08:03 |
208.3M |
video/x-msvideo |
| RECON2008-T02-Bruce_Dang-Methods_for_analyzing_malicious_Office_documents.avi |
2008-Jul-19 18:05:59 |
191.4M |
video/x-msvideo |
| RECON2008-T03-Ilfak_Guilfanov-Building_plugins_for_IDA_Pro.avi |
2008-Jul-19 19:39:57 |
312.5M |
video/x-msvideo |
| RECON2008-T04-Thomas_Garnier-Windows_privilege_escalation_through_LPC_and_ALPC_interfaces.avi |
2008-Jul-19 20:33:58 |
165.9M |
video/x-msvideo |
| RECON2008-T05-Nicolas_Pouvesle-NetWare_kernel_stack_overflow_exploitation.avi |
2008-Jul-19 21:33:00 |
195.7M |
video/x-msvideo |
| RECON2008-T05-Nicolas_Pouvesle-NetWare_kernel_stack_overflow_exploitation_512kb.mp4 |
2008-Jul-21 21:48:27 |
77.7M |
video/mp4 |
| RECON2008-T06-Cameron_Hotchkies-Under_the_iHood.avi |
2008-Jul-19 22:09:46 |
120.6M |
video/x-msvideo |
| RECON2008-T07-Jason_Raber-Helikaon_Linux_Debuger.avi |
2008-Jul-19 23:16:40 |
207.3M |
video/x-msvideo |
| RECON2008-T08-Craig_Smith-Creating_Code_Obfuscation_Virtual_Machines.avi |
2008-Jul-20 00:03:48 |
158.4M |
video/x-msvideo |
| RECON2008-T09-Eric_D_Laspe-The_Deobfuscator.avi |
2008-Jul-20 00:37:18 |
112.7M |
video/x-msvideo |
| RECON2008-T09-Eric_D_Laspe-The_Deobfuscator.flv |
2008-Jul-21 19:34:13 |
50.0M |
video/x-flv |
| RECON2008-T09-Eric_D_Laspe-The_Deobfuscator_512kb.mp4 |
2008-Jul-21 19:28:37 |
44.8M |
video/mp4 |
| RECON2008-T10-Nicolas_Brulez-Polymorphic_Virus_Analysis.avi |
2008-Jul-20 01:31:32 |
182.8M |
video/x-msvideo |
| RECON2008-T11-Michael_Strangelove-Hacking_Culture.avi |
2008-Jul-20 04:26:15 |
582.1M |
video/x-msvideo |
| RECON2008-T12-Anthony_de_Almeida_Lopes-Bypassing_Security_Protections_by_Backdooring_libc.avi |
2008-Jul-20 04:58:38 |
107.8M |
video/x-msvideo |
| RECON2008-T13-Alexander_Sotirov-Blackbox_Reversing_Of_XSS_Filters.avi |
2008-Jul-20 06:28:13 |
300.1M |
video/x-msvideo |
| RECON2008-T14-Aaron_Portnoy_and_Ali_Rizvi-Santiago-Reverse_Engineering_Dynamic_Languages_a_Focus_on_Python.avi |
2008-Jul-20 14:01:55 |
173.4M |
video/x-msvideo |
| RECON2008-T15-Sharon_Conheady_and_Alex_Bayly-Social_Engineering_for_the_Socially_Inept.avi |
2008-Jul-20 07:51:17 |
271.7M |
video/x-msvideo |
| RECON2008-T15-Sharon_Conheady_and_Alex_Bayly-Social_Engineering_for_the_Socially_Inept.gif |
2008-Jul-20 14:27:00 |
574.0K |
image/gif |
| RECON2008-T16-Pablo_Sole-RE_over_Adobe_Acrobat_Reader_using_Immunity_Debugger.avi |
2008-Jul-20 08:35:37 |
147.7M |
video/x-msvideo |
| RECON2008-T16-Pablo_Sole-RE_over_Adobe_Acrobat_Reader_using_Immunity_Debugger.flv |
2008-Jul-21 09:03:14 |
46.7M |
video/x-flv |
| RECON2008-T16-Pablo_Sole-RE_over_Adobe_Acrobat_Reader_using_Immunity_Debugger_512kb.mp4 |
2008-Jul-21 08:53:52 |
42.1M |
video/mp4 |
| RECON2008-T17-Gera-Two_very_small_reverse_engineering_tools.avi |
2008-Jul-20 09:18:25 |
143.9M |
video/x-msvideo |
| RECON2008-T18-Tiller_Beauchamp-RE_Trace-Applied_Reverse_Engineering_on_OS_X.avi |
2008-Jul-20 10:46:24 |
294.7M |
video/x-msvideo |
| RECON2008-T18-Tiller_Beauchamp-RE_Trace-Applied_Reverse_Engineering_on_OS_X.gif |
2008-Jul-20 14:33:29 |
537.9K |
image/gif |
| RECON2008-T18-Tiller_Beauchamp-RE_Trace-Applied_Reverse_Engineering_on_OS_X_512kb.mp4 |
2008-Jul-21 11:00:31 |
86.9M |
video/mp4 |
| RECON2008-T19-Sebastien_Doucet-64-bit_Imports_Rebuilding_and_Unpacking-Part1.avi |
2008-Jul-20 12:13:31 |
292.5M |
video/x-msvideo |
| RECON2008-T19-Sebastien_Doucet-64-bit_Imports_Rebuilding_and_Unpacking-Part2.avi |
2008-Jul-20 12:59:27 |
153.4M |
video/x-msvideo |
| RECON2008_files.xml |
2008-Jul-28 21:34:33 |
49.9K |
application/xml |
| RECON2008_meta.xml |
2008-Jul-28 21:34:33 |
4.2K |
application/xml |
| RECON2008_reviews.xml |
2008-Oct-13 17:09:50 |
0.5K |
application/xml |