Think you understand how LLMs work? You might be surprised. 😳
In his latest blog post, @blaisebrignac.bsky.social explains the history, challenges, and attack primitives that make securing AI systems such an extreme challenge.
Read more: ghst.ly/497pxl0
Posts by BlaiseBits
In Part 1 of my Intune Attack Paths series, I discuss the fundamental components and mechanics of Intune that lead to the emergence of attack paths: posts.specterops.io/intune-attac...
That's one of the primary reasons I stick to live streaming, even though I want to produce more videos.
Another big challenge with technology is it changes so fast it's hard to make evergreen videos.
I also worry about how to get my own professional development done, so I just do it on stream.
Been working on @dreadnode.bsky.social's Crucible AI CTF and just completed the "What's the flag #6" challenge. Such a fun time! Everyone in chat had a great time providing suggestions.
Hats off to the CTF authors, they did a fantastic job!
www.youtube.com/live/YTZft0L...
CVE-2023-34990 🤦♂️🤦♂️
Die Hard is a Harry Potter prequel about Snape's origin story.
being a network engineer
They got the goods, then let their newbies come in to get hands-on experience.
Plot twist, experienced operators had a betting pool to see how long till they got detected.
Wtf is this non-tech post?! 😜
NTLM v1 is removed from the latest version of Windows
Oh by the way
Using the EDR against itself.
Careful handling those, I feel they could put you in a...
(•_•)
( •_•)>⌐■-■
(⌐■_■)
Vulnerable situation.
Not to besmirch training courses, but you CAN find the information on blogs all over the Internet.
The main benefit to a training course is the organization of the material and the order of presentation.
Trying to learn a subject without a dependency order is way harder.
This is pretty sick, and if you have a dedicated cracking rig def worth a try, especially if your pentest is unauthenticated.
The chances of cracking a machine account are exceptionally low, maybe 1%, so I wouldn't fire this off in AWS cracking.
Fast forward, I end up getting the position 2nd time through. I'm on an engagement and have a briefing of the work my team lead and I had done. After that I got a message that one of my interviewers was impressed how much I had improved in that year. 😁
Today, I'm thankful I was turned down from my dream job last year.
I was crushed and honestly pretty pissed, so I decided to work even harder and learn as much as possible about red teaming. Big shout out to @rastamouse.me for his material at Zero Point Security.
Often crawling under the wires is the best.