Media releases are provided as is by companies and have not been edited or checked for accuracy. Any queries should be directed to the company itself.
  • 25 March 2011 11:58

Australia’s Pure Hacking CTO to run Shellcode Lab Training at Black Hat Security Conference 2011

Ty Miller, CTO, Pure Hacking to present an elite security skills Training Course for Penetration Testers, Security Officers, Security Auditors and System Administrators to form official program for world’s most prestigious security conference

Sydney, 25 March 2011 – Pure Hacking, the Australian experts in helping organisations protect their information assets today confirmed that its Chief Technology Officer, Ty Miller, has been confirmed on the official Black Hat 2011 conference program as a Trainer. Miller will be running a multi-day, high intensity training course, “The Shellcode Lab” to develop and understand shellcode in a hands-on environment. Course attendees will gain a thorough knowledge and practical skill set on how to create shellcode and tune their elite security skills. This is the second program appearance for Miller at the world’s most high profile security event. He previously presented his development of “Reverse DNS Tunneling Shellcode” at the Black Hat event in 2008.

Rob McAdam, CEO of Pure Hacking commented, “We are thrilled to have Ty included in the world’s most high profile security event. This is absolute confirmation of his knowledge in security issues and global security trends and reinforces the depth in our team here in Australia.” The two day training course will provide attendees with a “Virtual Shellcode Development Environment” that is designed to enable shellcode development across multiple platforms including Linux, Mac 64-bit OSX and Windows. Students are instructed in the development of simple to complex shellcode and Metasploit Exploit Framework (MSF) integration to successfully execute your own shellcode within all MSF exploits.

Targeted at Penetration Testers, Security Officers, Security Auditors and System Administrators, “The Shellcode Lab” is ideal for attendees interested in shellcoding, exploitation, vulnerabilities or Metasploit. It is also suitable for developers interested in gaining low-level security development skills with shellcoding and assembly, plus management staff needing to better understand how Information Technology Systems are compromised.

For trainer and Pure Hacking CTO, Ty Miller, the confirmation of “The Shellcode Lab” is a significant milestone for his career. “I am really pleased to be able to share my experience in the security specialist industry with others. To be selected for the official Black Hat program again is an honour,” he said.

Concurrent to his role as CTO at Pure Hacking, Miller performs independent security research and is co-author of the book Hacking Exposed Linux 3rd edition. He runs the shellcoding site ‘Project Shellcode’ (www.projectshellcode.com) and was involved in the design of the bootable CHAOS Linux cluster distribution. Interested participants can visit http://www.blackhat.com/html/bh-us-11/training/miller-shellcode.html and http://www.youtube.com/watch?v=oY9cylPr2Bw for details on the event and how to register.

Ends

About Pure Hacking Pure Hacking is Australia’s leading dedicated, vendor-neutral ethical hacking company in Australia. Its sole focus is risk and security. Today it provides secure development services, secure code reviews, penetration testing and training modules to a range of clients throughout the Asia Pacific region.

For further information please contact: Cathryn van der Walt 12 Worlds for Pure Hacking Tel: +61 (0) 402 327 633 Cathryn@12worlds.com

Submit a media release
CSO Corporate Partners
  • Webroot
  • Trend Micro
  • NetIQ
rhs_login_lockGet exclusive access to CSO, invitation only events, reports & analysis.
CSO Directory

Endpoint Encryption

Robust data protection for PCs, smartphones, and removable media

Latest Jobs
Security Awareness Tip

Incident handling is a vast topic, but here are a few tips for you to consider in your incident response. I hope you never have to use them, but the odds are at some point you will and I hope being ready saves you pain (or your job!).


  1. Have an incident response plan.

  2. Pre-define your incident response team 

  3. Define your approach: watch and learn or contain and recover.

  4. Pre-distribute call cards.

  5. Forensic and incident response data capture.

  6. Get your users on-side.

  7. Know how to report crimes and engage law enforcement. 

  8. Practice makes perfect.

For the full breakdown on this article

Security ABC Guides

Warning: Tips for secure mobile holiday shopping

I’m dating myself, but I remember when holiday shopping involved pouring through ads in the Sunday paper, placing actual phone calls from tethered land lines to research product stock and availability, and actually driving places to pick things up. Now, holiday shoppers can do all of that from a smartphone or tablet in a few seconds, but there are some security pitfalls to be aware of.