Sydney, 25 March 2011 – Pure Hacking, the Australian experts in helping organisations protect their information assets today confirmed that its Chief Technology Officer, Ty Miller, has been confirmed on the official Black Hat 2011 conference program as a Trainer. Miller will be running a multi-day, high intensity training course, “The Shellcode Lab” to develop and understand shellcode in a hands-on environment. Course attendees will gain a thorough knowledge and practical skill set on how to create shellcode and tune their elite security skills. This is the second program appearance for Miller at the world’s most high profile security event. He previously presented his development of “Reverse DNS Tunneling Shellcode” at the Black Hat event in 2008.
Rob McAdam, CEO of Pure Hacking commented, “We are thrilled to have Ty included in the world’s most high profile security event. This is absolute confirmation of his knowledge in security issues and global security trends and reinforces the depth in our team here in Australia.” The two day training course will provide attendees with a “Virtual Shellcode Development Environment” that is designed to enable shellcode development across multiple platforms including Linux, Mac 64-bit OSX and Windows. Students are instructed in the development of simple to complex shellcode and Metasploit Exploit Framework (MSF) integration to successfully execute your own shellcode within all MSF exploits.
Targeted at Penetration Testers, Security Officers, Security Auditors and System Administrators, “The Shellcode Lab” is ideal for attendees interested in shellcoding, exploitation, vulnerabilities or Metasploit. It is also suitable for developers interested in gaining low-level security development skills with shellcoding and assembly, plus management staff needing to better understand how Information Technology Systems are compromised.
For trainer and Pure Hacking CTO, Ty Miller, the confirmation of “The Shellcode Lab” is a significant milestone for his career. “I am really pleased to be able to share my experience in the security specialist industry with others. To be selected for the official Black Hat program again is an honour,” he said.
Concurrent to his role as CTO at Pure Hacking, Miller performs independent security research and is co-author of the book Hacking Exposed Linux 3rd edition. He runs the shellcoding site ‘Project Shellcode’ (www.projectshellcode.com) and was involved in the design of the bootable CHAOS Linux cluster distribution. Interested participants can visit http://www.blackhat.com/html/bh-us-11/training/miller-shellcode.html and http://www.youtube.com/watch?v=oY9cylPr2Bw for details on the event and how to register.
About Pure Hacking Pure Hacking is Australia’s leading dedicated, vendor-neutral ethical hacking company in Australia. Its sole focus is risk and security. Today it provides secure development services, secure code reviews, penetration testing and training modules to a range of clients throughout the Asia Pacific region.
For further information please contact: Cathryn van der Walt 12 Worlds for Pure Hacking Tel: +61 (0) 402 327 633 Cathryn@12worlds.com
Speakers: David Lacey, Researcher and former CISO Royal Mail David Turner - Global Risk Management Expert Mark Guntrip - Group Manager, Email Protection, Proofpoint
Speakers • Ty Miller, Director, Threat Intelligence • Mark Gregory, Leader, Network Engineering Research Group, RMIT • Jeff Lanza, Retired FBI Agent (USA) • Andy Solterbeck, VP Asia Pacific, Cylance • David Braue, CSO MC/Moderator What to expect: Hear from industry experts on the local and global ransomware threat landscape. Explore a new approach to dealing with ransomware using machine-learning techniques and by thinking about the problem in a fundamentally different way. Apply techniques for gathering insight into ransomware behaviour and find out what elements must go into a truly effective ransomware defence. Get a first-hand look at how ransomware actually works in practice, and how machine-learning techniques can pick up on its activities long before your employees do.
Speakers: • Anthony Caruana – CSO MC and moderator • Ian Farquhar, Worldwide Virtual Security Team Lead, Gigamon • John Lindsay, Former CTO, iiNet • Skeeve Stevens, Futurist, Future Sumo • David Vaile - Vice chair of APF, Co-Convenor of the Cyberspace Law And Policy Community, UNSW Law Faculty This webinar covers: - A 101 on metadata - what it is and how to use it - Insight into a typical attack, what happens and what we would find when looking into the metadata - How to collect metadata, use this to detect attacks and get greater insight into how you can use this to protect your organisation - Learn how much raw data and metadata to retain and how long for - Get a reality check on how you're using your metadata and if this is enough to secure your organisation
CSO Webinar: How banking trojans work and how you can stop them Featuring: • John Baird, Director of Global Technology Production, Deutsche Bank • Samantha Macleod, GM Cyber Security, ME Bank • Sherrod DeGrippo, Director of Emerging Threats, Proofpoint (USA)
Speakers - Mike Harris, Engineering Services Manager, Jetstar - Christopher Johnson, IT Director APAC, 20th Century Fox - Brent Maxwell, Director of Information Systems, THE ICONIC - IDG MC/Moderator Anthony Caruana