List of Material
D1-LAB-Sniffing-the-Airwaves-with-RTL-SDR.pdf
D1T1-Compromise-as-a-Service-Our-PleAZURE.pdf
D1T1-Hacking-Your-Cable-TV-Network-Die-Hard-Style.pdf
D1T2-REboot-Bootkits-Revisited.pdf
D1T2-State-of-the-Art-Exploring-the-New-Android-KitKat-Runtime.pdf
D2-LAB-Attack-Surface-Intelligence-of-Source-Code.pdf
D2T1-Alices-Adventures-in-Smart-Building-Land.pdf
D2T1-Exploiting-Passbook-to-Fly-for-Free.pdf
D2T1-G-Jacking-AppEngine-based-Applications.pdf
D2T1-GRX-and-a-Spy-Agency.pdf
D2T1-Why-Port-Scans-are-for-Pussies.pdf
D2T2-Breaking-Cloud-Isolation.pdf
D2T2-Exploring-and-Exploiting-iOS-Web-Browsers.pdf
D2T2-The-InSecurity-of-Pull-Printing-Solutions.pdf
D2T3-Format-Reverser-of-Data-Objects.pdf
D2T3-Using-Javascript-Security-Features-to-Kill-Itself.pdf