- 25 March 2011 11:58
Australia’s Pure Hacking CTO to run Shellcode Lab Training at Black Hat Security Conference 2011
Sydney, 25 March 2011 – Pure Hacking, the Australian experts in helping organisations protect their information assets today confirmed that its Chief Technology Officer, Ty Miller, has been confirmed on the official Black Hat 2011 conference program as a Trainer. Miller will be running a multi-day, high intensity training course, “The Shellcode Lab” to develop and understand shellcode in a hands-on environment. Course attendees will gain a thorough knowledge and practical skill set on how to create shellcode and tune their elite security skills. This is the second program appearance for Miller at the world’s most high profile security event. He previously presented his development of “Reverse DNS Tunneling Shellcode” at the Black Hat event in 2008.
Rob McAdam, CEO of Pure Hacking commented, “We are thrilled to have Ty included in the world’s most high profile security event. This is absolute confirmation of his knowledge in security issues and global security trends and reinforces the depth in our team here in Australia.” The two day training course will provide attendees with a “Virtual Shellcode Development Environment” that is designed to enable shellcode development across multiple platforms including Linux, Mac 64-bit OSX and Windows. Students are instructed in the development of simple to complex shellcode and Metasploit Exploit Framework (MSF) integration to successfully execute your own shellcode within all MSF exploits.
Targeted at Penetration Testers, Security Officers, Security Auditors and System Administrators, “The Shellcode Lab” is ideal for attendees interested in shellcoding, exploitation, vulnerabilities or Metasploit. It is also suitable for developers interested in gaining low-level security development skills with shellcoding and assembly, plus management staff needing to better understand how Information Technology Systems are compromised.
For trainer and Pure Hacking CTO, Ty Miller, the confirmation of “The Shellcode Lab” is a significant milestone for his career. “I am really pleased to be able to share my experience in the security specialist industry with others. To be selected for the official Black Hat program again is an honour,” he said.
Concurrent to his role as CTO at Pure Hacking, Miller performs independent security research and is co-author of the book Hacking Exposed Linux 3rd edition. He runs the shellcoding site ‘Project Shellcode’ (www.projectshellcode.com) and was involved in the design of the bootable CHAOS Linux cluster distribution. Interested participants can visit http://www.blackhat.com/html/bh-us-11/training/miller-shellcode.html and http://www.youtube.com/watch?v=oY9cylPr2Bw for details on the event and how to register.
About Pure Hacking Pure Hacking is Australia’s leading dedicated, vendor-neutral ethical hacking company in Australia. Its sole focus is risk and security. Today it provides secure development services, secure code reviews, penetration testing and training modules to a range of clients throughout the Asia Pacific region.
For further information please contact: Cathryn van der Walt 12 Worlds for Pure Hacking Tel: +61 (0) 402 327 633 Cathryn@12worlds.com
Sign up now »
Developed by the CIO Executive Council, Pathways is a unique, flexible, self-managed, self-paced 12-month professional development program that brings together best practices, thought leadership and business insights for today’s most ...
Enterprises, both small and big, are evaluating cloud computing and, in increasing numbers, are moving their IT infrastructure ...
"The most complex IT projects can be managed all right provided you ..."
Why IT projects really fail
"Yay, good news for the smart state."
Queensland government to provide 200 services online by 2015
"Great article, and it confirms what we see in call centers across ..."
Call Centers Suffer From Big Data Overload
"So why are people flocking to GumTree?"
CIO 100: Carsales wins top gong for innovation
"A much easier solution is to use LastPass. You will only have ..."
How to secure passwords and other critical numbers
- New website lets users check if their online credentials were exposed in large data leaks
- Conventional insurance may not cover cyber security breaches: Centre for Internet Safety
- JP Morgan suffers cyber attack, 465,000 card customer details stolen
- PayPal DDoS attackers plead guilty, some may walk free
- 'ZeroAccess' click-fraud botnet disrupted, but not dead yet
- Distracted consumers spend less time on social than email marketing: Report
- New report busts myths about millennials and their digital and social behaviour
- Twitter gobbles up more cookies with retargeted ads, says users have privacy choices
- How to start the journey towards customer-centricity
- Gaining efficiency around search-based marketing: REA Group's keyword quest