
Welcome to introduction to exploiting AI with Ben Bowman. In this workshop, we’ll discuss the MITRE attack framework and inherent flaws with AI and security, attack vectors, and how to make sure you know how not to deploy or handle an AI.
Course Length: 4 Hours
Includes a Certificate of Completion
Next scheduled date:
Description
Welcome to introduction to exploiting AI with Ben Bowman. In this workshop, we’ll discuss the MITRE attack framework and inherent flaws with AI and security, attack vectors, and how to make sure you know how not to deploy or handle an AI.
This class will mostly be the offensive side of things with students getting to practice offensive techniques in a controlled environment as well as learning about tooling that exists to attack AI models. This should help students understand the risks of AI but will not teach any hands on defensive remediations, only discussion of how to potentially harden and remediate security issues.
-
Hardware Requirements
- Ryzen 5 or i5 CPU with 16 GB of RAM
-
Software Requirements
- Hypervisor(VMWare/Virtual Box) and Hugging Face.
-
VM/Lab/Student information
- VMs will be provided to the students.
Syllabus
The Basics
-
- What is AI and LLM
-
- Deep Dive
-
- What Attack Surfaces exist
Attack Vectors
-
- Prompt Injection
-
- Filter Dumping
-
- Containment Breach
-
- Data Poisoning
-
- Training a spam classifier
-
- Training a network traffic classification system
-
- Model Inversion Attacks
-
- Inferring Information Using a Loan Assessment AI
-
- Transfer Model Attack
Preventitive Measures
-
- Preventing Prompt Injection
-
- Preventing Data Poisoning
-
- Preventing Model Inversion Attacks
-
- Preventing Transfer Model Attacks
Understanding the real world
-
- Entering an Uncontrolled Environment
Tooling
-
- PyRit
-
- Garak
-
- Playgrounds
FAQ
This class is for people trying to learn about inherent risks that come with implementing AI in any facet.
Intermediate
About the Instructor
Benjamin Bowman
"Hacker | Researcher | Speaker | Bird Enthusiast"Bio
Ben Bowman joined the cyber security world at 12 years old. Slowly migrating from the wrong side of the field to the right side, perusing a bachelor’s in cyber operations and catching the attention of Black Hills Info Sec after appearing on NPR for hacking AI at Defcon. Follow me on GitHub: https://github.com/her3ticAVI
Related products
-
Hayden CovingtonLive4 Hrs
Workshop: SOC Detection Engineering Crash Course with Hayden Covington
View Course This product has multiple variants. The options may be chosen on the product page -
Bill McCauleyLive4 Hrs
Foundational Application Security Training with Bill McCauley
View Course -
Patterson CakeLive4 Hrs
Workshop: Investigating M365 Business Email Compromise with Patterson Cake
View Course This product has multiple variants. The options may be chosen on the product page -
Tanya JancaLive4 Hrs
Workshop: The OWASP API Security Top Ten 2023 with Tanya Janca
View Course This product has multiple variants. The options may be chosen on the product page

