Skip to content

This class is a broad overview and dive into Exploiting AI and the different attacks that exist, and best practice strategies.

Notifications You must be signed in to change notification settings

NullTrace-Security/Exploiting-AI

Repository files navigation

Banner

⚠ Course Pre-requisites

πŸ›ˆ Course Description

In this course we will cover different emerging attack vectors that exist on AI. With the growing usage and integration of AI in products and Services, an attack surface is emerging, hacking AI. We will then cover best practices to mediate the risks that exist and how to best impliment preventitive measures.

Course Information

πŸ›ˆ Course Instructor

πŸ›ˆ Course Information

πŸ”§ Labs and Content

πŸ“’ 01-AIOV - What is AI and LLM

πŸ“’ 01.1-AILB - Deep Dive

πŸ“’ 01.2-AILB - Attack Surface

πŸ“’ 02-AIOV - Prompt Injection

πŸ₯Ό 02.1-AILB - Filter Dumping

πŸ₯Ό 02.2-AILB - Containment Breach

πŸ“’ 02.3-AIOV - Preventing Prompt Injection

πŸ“’ 03-AIOV - Data Poisoning

πŸ₯Ό 03.1-AILB - Training a spam classifier

πŸ₯Ό 03.2-AILB - Training a network traffic classification system

πŸ“’ 03.3-AIOV - Preventing Data Poisoning

πŸ“’ 04-AIOV - Model Inversion Attack

πŸ₯Ό 04.1-AILB - Inferring Information Using a Loan Assessment AI

πŸ“’ 04.2-AIOV - Preventing Model Inversion Attacks

πŸ“’ 05-AIOV - Transfer Model Attack Overview

πŸ₯Ό 05.1-AILB - Attacking Two Models with one Prompt

πŸ“’ 05.2-AIOV - Preventing Transfer Model Attacks

πŸ₯Ό 05.3-AILB - Entering an Uncontrolled Environment

πŸ“’ 06-AIOV - Tooling

πŸ₯Ό 06.1-AILB - PyRit

πŸ₯Ό 06.2-AILB - Garak

πŸ₯Ό 07-AILB - Playgrounds

πŸ”§ Resources

TODO