We are always proud to share our successes at Pure Hacking and thought it was high time we let you know about the growing global reputation our CTO, Ty Miller is generating.
After being invited to present and train at Black Hat for two years in a row, Asia Pacific security teams can now gain the valuable experience of Ty's training course closer to home.
He will be running training at Breakpoint in Melbourne on 15-16 October and presenting a new attack technique that makes browser zero-day exploits irrelevant by proxying exploits through a web browser to exploit internal corporate systems at Ruxcon in Melbourne on 20-21 October.
Ty has also just been confirmed as an international trainer at the upcoming Hack In the Box security conference to be held in Kuala Lumpur on 8-11 October.
At Breakpoint and Hack in the Box, Ty will be running his internationally renowned "The Shellcode Lab" training course for penetration testers, security officers and auditors, system administrators and managers wanting to improve their security skills and knowledge.
Over two days participants are provided with a “Virtual Shellcode Development Environment” that is designed to enable shellcode development across multiple platforms including Linux, Mac 64-bit OSX and Windows. Students are instructed in the development of simple to complex shellcode and Metasploit Exploit Framework (MSF) integration to successfully execute your own shellcode within all MSF and public exploits.
“The Shellcode Lab” is ideal for security testers, managers and officers interested in shellcoding, exploitation, vulnerabilities or Metasploit. It is also suitable for developers interested in gaining low-level security development skills with shellcoding and assembly, plus management staff needing to better understand how Information Technology Systems are compromised.
Unable to attend Hack in the Box, Breakpoint or Ruxcon? Please email Ty at Ty.Miller@purehacking.com if you would be interested in him delivering "The Shellcode Lab" to your security team.