Join us in-person this July for the first-ever Antisyphon Summer Camp! Register Here

Exploiting AI with Ben Bowman

Exploiting AI with Ben Bowman

Overview

  • Course Length: 16 hours
  • Support from expert instructors
  • Includes a certificate of completion
  • Up to 12 months access to Cyber Range
Instructor:

Exploiting AI begins with the assumption that there’s little to no understanding of AI beyond tools like ChatGPT. This course starts by introducing the basics—how AI behaves, key concepts, and essential terminology in the field.

Once that foundation is in place, the focus shifts to exploring attack surfaces through hands-on labs and practical examples. From there, the course examines common vulnerabilities and discusses what high-level remediation looks like, without diving too deep into technical specifics.

As the course progresses, learners will delve into AI security threats and explore how to utilize, automate, and execute attacks using pre-built tools. With a broader understanding of how AI intersects with offensive security, the final modules introduce real-world testing methodologies. These include frameworks such as OWASP, MITRE, and a custom approach developed by the instructor—all supported by hands-on lab work.

Syllabus

Learning the Basics

What is AI and LLM
Deep Dive
Terminology and Attack Surfaces

AI Spaces

AI Training Spaces and Hosting
Hugging Face
Ollama
MSTY
LMStudio

Our First AI

Creating our First Dataset
Training a model locally (SKIP IF LOW PC SPECS)
Hosting a Pre-Trained Model in OpenWebUI

Attack Surfaces and Remediations

Prompt Injection
Bypassing Gaurdrails
Filter Dumping
Preventing Prompt Injection
Data Poisoning and Refining
Training a spam classifier
Preventing Data Poisoning
Model Inversion Attack
Inferring Information Using a Loan Assessment AI
Preventing Model Inversion Attacks
Transfer Model Attack Overview
Attacking Two Models with one Prompt
Preventing Transfer Model Attacks
RAG AI Attack Overview
Attacking RAG
Preventing RAG Attacks
Ablation Overview
Ablating an LLM

Tooling

PyRit
Garak
WhiteRabbitNeo
Fabric
Jupyter Notebook
ai-exploits
promptfoo
spikee
giskard
PyRIT-Ship 
exo
eternal

Offensive Testing Methodology

OWASP Methodology
MITRE Methodology
Heretics Methodology 

System Requirements

Ryzen 5 or i5 CPU with 16 GB of RAM | No ARM machines (Mac)

Who should take this workshop/prerequisites

This class is for people trying to learn about inherent risks that come with implementing AI in any facet.

VM/Lab

The students will need to bring there own Debian based VM preferably the newest image of Ubuntu. They will need to have docker installed.

Audience Skill Level

Intermediate

Student Requirements

Debian Virtual Machine and Hugging Face.

There are no scheduled live dates for this course at this time.

Shopping Cart

No products in the cart.