https://twitch.tv/blaisebits
In his latest blog post, @blaisebrignac.bsky.social explains the history, challenges, and attack primitives that make securing AI systems such an extreme challenge.
Read more: ghst.ly/497pxl0
In his latest blog post, @blaisebrignac.bsky.social explains the history, challenges, and attack primitives that make securing AI systems such an extreme challenge.
Read more: ghst.ly/497pxl0
Hats off to the CTF authors, they did a fantastic job!
www.youtube.com/live/YTZft0L...
Hats off to the CTF authors, they did a fantastic job!
www.youtube.com/live/YTZft0L...
Die Hard is about using impossibly limited resources to defend a tower from foreign invaders.
Die Hard is a Hanukkah movie.
Plot twist, experienced operators had a betting pool to see how long till they got detected.
Plot twist, experienced operators had a betting pool to see how long till they got detected.
The main benefit to a training course is the organization of the material and the order of presentation.
Trying to learn a subject without a dependency order is way harder.
The main benefit to a training course is the organization of the material and the order of presentation.
Trying to learn a subject without a dependency order is way harder.
The chances of cracking a machine account are exceptionally low, maybe 1%, so I wouldn't fire this off in AWS cracking.
In AD environments, the DC hashes NTP responses with the computer account NT hash. That means that you can request and brute force all computer accounts in a domain from an UNAUTHENTICATED perspective!
Implemented by Disgame
1/3🧵
The chances of cracking a machine account are exceptionally low, maybe 1%, so I wouldn't fire this off in AWS cracking.
I was crushed and honestly pretty pissed, so I decided to work even harder and learn as much as possible about red teaming. Big shout out to @rastamouse.me for his material at Zero Point Security.
I was crushed and honestly pretty pissed, so I decided to work even harder and learn as much as possible about red teaming. Big shout out to @rastamouse.me for his material at Zero Point Security.