
Welcome to introduction to exploiting AI with Ben Bowman. In this workshop, we’ll discuss the MITRE attack framework and inherent flaws with AI and security, attack vectors, and how to make sure you know how not to deploy or handle an AI.
Course Length: 4 Hours
Includes a Certificate of Completion
Next scheduled date:
Description
Welcome to introduction to exploiting AI with Ben Bowman. In this workshop, we’ll discuss the MITRE attack framework and inherent flaws with AI and security, attack vectors, and how to make sure you know how not to deploy or handle an AI.
This class will mostly be the offensive side of things with students getting to practice offensive techniques in a controlled environment as well as learning about tooling that exists to attack AI models. This should help students understand the risks of AI but will not teach any hands on defensive remediations, only discussion of how to potentially harden and remediate security issues.
System Requirements
-
Hardware Requirements
- Ryzen 5 or i5 CPU with 16 GB of RAM
-
Software Requirements
- Hypervisor(VMWare/Virtual Box) and Hugging Face.
-
VM/Lab/Student information
- VMs will be provided to the students.
Syllabus
The Basics
-
- What is AI and LLM
-
- Deep Dive
-
- What Attack Surfaces exist
Attack Vectors
-
- Prompt Injection
-
- Filter Dumping
-
- Containment Breach
-
- Data Poisoning
-
- Training a spam classifier
-
- Training a network traffic classification system
-
- Model Inversion Attacks
-
- Inferring Information Using a Loan Assessment AI
-
- Transfer Model Attack
Preventitive Measures
-
- Preventing Prompt Injection
-
- Preventing Data Poisoning
-
- Preventing Model Inversion Attacks
-
- Preventing Transfer Model Attacks
Understanding the real world
-
- Entering an Uncontrolled Environment
Tooling
-
- PyRit
-
- Garak
-
- Playgrounds
FAQ
About the Instructor

Benjamin Bowman
"Hacker | Researcher | Speaker | Bird Enthusiast"Bio
Ben Bowman joined the cyber security world at 12 years old. Slowly migrating from the wrong side of the field to the right side, perusing a bachelor’s in cyber operations and catching the attention of Black Hills Info Sec after appearing on NPR for hacking AI at Defcon. Follow me on GitHub: https://github.com/her3ticAVI
Related products
-
Multiple InstructorsLive
Workshop: Offensive Tooling Foundations with Chris Traynor
View Course -
Multiple InstructorsLive
Workshop: How to Befriend and Bedazzle Online Threat Actors with Tim Pappa
View Course This product has multiple variants. The options may be chosen on the product page -
Multiple InstructorsLive
Workshop: Investigating M365 Business Email Compromise with Patterson Cake
View Course This product has multiple variants. The options may be chosen on the product page -
Multiple InstructorsLive
Workshop: Tactical Vulnerability Assessment with Matt Toussain
View Course This product has multiple variants. The options may be chosen on the product page