Advanced Application of Adversarial AI for Scenario Based Hacking
In this 2-days hands-on training we will explore the pure offensive application of AI and ML and teach the audience how to build them completely from the scratch. Over the 2 days period, we will dive into various hacking scenarios and offensive use cases and start building the adversarial AI models from start to end. We will continue our journey of learning and practicing till we reach a level where participants are able to create a complete automated attack tool of their own using AI/ML.
The entire training program contains plenty of practical examples, scenario based exercises, revision questions and cheat sheets to ensure that the participants won't miss anything and able to apply them at their work after the training.
We will cover the following:
Real-world adversarial AI attack examples and methodologies - How various attacks have happened so far and how they have been articulated.
How swiftly you can ingest millions of records, process then, analyse the features at scale and find interesting loopholes to plan your attack.
Architecture of an attacker bot implementation
Learn various evasion techniques using AI like - evade spam filters, bot detection, IDs etc.
How to trigger offensive attacks using AI - detect web vulnerabilities using AI and trigger attacks, attack speech recognition systems, crack passwords etc.
How to bypass biometrics authentications like facial recognition, voice recognition, captcha etc. using AI:
Trigger Next Generation Social Engineering using AI, impersonate someone in whatsapp, telegram, voice call, video call etc.
BONUS PROJECT: CREATE YOUR OWN CLONE USING AI
The final part would be a hackathon to build a fully automated attack tool using a deep exploit framework completely driven by AI, i.e. without any human intervention.
Online cloud based labs, valid for one month free private access, will be given to participants to perform and practice the real world challenges during the training program.
Last but not the least, we will also discuss the road ahead, further research topics and study references. We will also brainstorm on the few upcoming research areas on machine learning and cyber security and see if there are any opportunities to spin off open source projects.
Skills / Knowledge
- PenTesting
- Human