If you are anything like me, when you hear "Hacking in the Year 2030" you immediately visualize hacking robot armies and UFOs to take them down with lazers and ultrasonic USB attachments via your PlayStation 10 using only changes in pupil dilation to read mental instructions of what hacking tools to launch.
Well this technology may very well be around in 2030, but unfortunately most of you are more likely to still be exploiting Cross Site Scripting (XSS) vulnerabilities in the web interface of the killer robots.
Pure Hacking's CTO, Ty Miller was invited to present at Black Hat 2012 for his third appearance as an official trainer at the world’s most high profile security event. Ty originally presented his development of “Reverse DNS Tunneling Shellcode” at Black Hat 2008 and has been an official part of the program with "The Shellcode Lab" since 2011.
Ty Miller, CTO of Pure Hacking, Australia’s leading specialist information security consultancy has been confirmed as an international speaker at the upcoming Hack in the Box security conference, 8 - 11 October, Kuala Lumpur, Malaysia. Miller will be running his internationally renowned "The Shellcode Lab" training course for penetration testers, security officers and auditors, system administrators and managers wanting to improve their shellcoding security skills. This is the first time that "The Shellcode Lab" will be available to Hack in the Box participants.
About a month ago I was chatting on skype to a colleague about a payload for one of our clients. Completely by accident, my payload executed in my colleagues skype client.
I decided to investigate a little further and found that the Windows and Linux clients were not vulnerable. It was only the Mac skype client that seemed to be affected. So I decided to test another mac and sent the payload to my girlfriend. She wasn't too happy with me as it also left the her skype unusable for several days.