Workshop: Exploiting AI with Ben Bowman

Overview
- Course Length: 4 hours
- Support from expert instructors
- Includes a certificate of completion
What You
Can
Welcome to introduction to exploiting AI with Ben Bowman. In this workshop, we’ll discuss the MITRE attack framework and inherent flaws with AI and security, attack vectors, and how to make sure you know how not to deploy or handle an AI.
This class will mostly be the offensive side of things with students getting to practice offensive techniques in a controlled environment as well as learning about tooling that exists to attack AI models. This should help students understand the risks of AI but will not teach any hands on defensive remediations, only discussion of how to potentially harden and remediate security issues.
Syllabus
The Basics
- What is AI and LLM
- Deep Dive
- What Attack Surfaces exist
Attack Vectors
- Prompt Injection
- Filter Dumping
- Containment Breach
- Data Poisoning
- Training a spam classifier
- Training a network traffic classification system
- Model Inversion Attacks
- Inferring Information Using a Loan Assessment AI
- Transfer Model Attack
Preventitive Measures
- Preventing Prompt Injection
- Preventing Data Poisoning
- Preventing Model Inversion Attacks
- Preventing Transfer Model Attacks
Understanding the real world
- Entering an Uncontrolled Environment
Tooling
- PyRit
- Garak
- Playgrounds
Virtual (April 11th, 2025)
- April 11th – 11 AM EST – 4 PM EST
System Requirements
- Ryzen 5 or i5 CPU with 16 GB of RAM
Who should take this workshop/prerequisites
- This class is for people trying to learn about inherent risks that come with implementing AI in any facet.
VM/Lab/Student information
- VMs will be provided to the students.
Audience Skill Level
- Intermediate
Student Requirements
- Hypervisor(VMWare/Virtual Box) and Hugging Face.
Live Training
- Pay What You Can
- Collaborative interaction with Instructor and fellow students through the Antisyphon Discord class channel
- Access to course slides for future reference
- Tips, tools, and techniques that can be applied immediately upon returning to work
- Strengthen your skills by solving challenges within the Antisyphon Cyber Range
- Become part of a community driven to educate and share knowledge