Tags
Language
Tags
May 2025
Su Mo Tu We Th Fr Sa
27 28 29 30 1 2 3
4 5 6 7 8 9 10
11 12 13 14 15 16 17
18 19 20 21 22 23 24
25 26 27 28 29 30 31
    Attention❗ To save your time, in order to download anything on this site, you must be registered 👉 HERE. If you do not have a registration yet, it is better to do it right away. ✌

    ( • )( • ) ( ͡⚆ ͜ʖ ͡⚆ ) (‿ˠ‿)
    SpicyMags.xyz

    Ethical Hacking against and with AI/LLM/ML Training Course

    Posted By: lucky_aut
    Ethical Hacking against and with AI/LLM/ML Training Course

    Ethical Hacking against and with AI/LLM/ML Training Course
    Published 3/2024
    Duration: 3h24m | .MP4 1280x720, 30 fps(r) | AAC, 44100 Hz, 2ch | 1.74 GB
    Genre: eLearning | Language: English

    Become professional in AI and LLM Penetration Testing and Vulnerability Discovery


    What you'll learn
    AI/LLM vulnerabilities
    get to a professional level in AI/LLM penetration testing
    get to a professional level in AI/LLM bug bounty
    Basics of AI/LLM
    AI/LLM Attacks
    AI/LLM Frameworks
    AI/LLM Prompt Injection
    AI/LLM Insecure Output Handling
    AI/LLM Training Data Poisoning
    AI/LLM Denial of Service
    AI/LLM Supply Chain
    AI/LLM Permission Issues
    AI/LLM Data Leakage
    AI/LLM Excessive Agency
    AI/LLM Overreliance
    AI/LLM Insecure Plugins
    AI/LLM Threat Model
    Using AI for Penetration Testing / Ethical Hacking
    The Yolo AI Tool



    Requirements
    Computer with a minimum of 4GB ram/memory
    Operating System: Windows / Apple Mac OS / Linux
    Reliable internet connection
    Burp Suite (Community or Pro)
    Firefox Web Browser
    Instance of Kali Linux (Raspberry PI, VM, Virtualbox etc.)

    Description
    Ethical Hacking against and with AI/LLM/ML Training Course
    Welcome to this course of Ethical Hacking and Penetration Testing Artificial Intelligence (AI) and Large Language Models (LLM) Training course.
    Important note: This course is NOT teaching the actual usage of Burp Suite and its features.
    Your instructor is Martin Voelk. He is a Cyber Security veteran with 25 years of experience. Martin holds some of the highest certification incl. CISSP, OSCP, OSWP, Portswigger BSCP, CCIE, PCI ISA and PCIP. He works as a consultant for a big tech company and engages in Bug Bounty programs where he found thousands of critical and high vulnerabilities.
    This course has a both theory and practical lab sections with a focus on finding and exploiting vulnerabilities in AI and LLM systems and applications. The training is aligned with the OWASP Top 10 LLM vulnerability classes. Martin is solving all the LLM labs from Portswigger in addition to a lot of other labs and showcases. The videos are easy to follow along and replicate. There is also a dedicate section on how to use AI for Penetration Testing / Bug Bounty Hunting and Ethical Hacking.
    The course features the following:
    · AI/LLM Introduction
    · AI/LLM Attacks
    · AI/LLM Frameworks / writeups
    · AI LLM01: Prompt Injection
    · AI LLM02: Insecure Output Handling
    · AI LLM03: Training Data Poisoning
    · AI LLM04: Denial of Service
    · AI LLM05: Supply Chain
    · AI LLM06: Permission Issues
    · AI LLM07: Data Leakage
    · AI LLM08: Excessive Agency
    · AI LLM09: Overreliance
    · AI LLM10: Insecure Plugins
    · Threat Model
    · Putting it all together
    · Using AI for Penetration Testing / Ethical Hacking
    · The Yolo AI Tool
    Notes & Disclaimer
    Portswigger labs are a public and a free service from Portswigger for anyone to use to sharpen their skills. All you need is to sign up for a free account. I will update this course with new labs as they are published. I will to respond to questions in a reasonable time frame. Learning Pen Testing / Bug Bounty Hunting is a lengthy process, so please don’t feel frustrated if you don’t find a bug right away. Try to use Google, read Hacker One reports and research each feature in-depth. This course is for educational purposes only. This information is not to be used for malicious exploitation and must only be used on targets you have permission to attack.
    Who this course is for:
    Anybody interested in becoming professional in ethical AI/LLM hacking / penetration testing
    Anybody interested in becoming professional in ethical AI/LLM bug bounty hunting
    Anybody interested in learning how hackers hack AI/LLM
    Developers looking to expand on their knowledge of vulnerabilities that may impact them
    Anyone interested in AI/LLM security
    Anyone interested in Red teaming
    Anyone interested in offensive security

    More Info