
The Evasion Attack Atlas
A Complete Classification of Adversarial Evasion Techniques First, a quick recap from Part 1: Intro to AML In Part 1, we learned that evasion attacks manipulate inputs during inference to fool...

A Complete Classification of Adversarial Evasion Techniques First, a quick recap from Part 1: Intro to AML In Part 1, we learned that evasion attacks manipulate inputs during inference to fool...

We often test web apps and networks for vulnerabilities, but what happens when the target is the AI model itself? AI systems are now making decisions in banking, healthcare, malware detection, and...

Ossuary Writeup Difficulty: Medium Category: Active Directory TL;DR Unauthenticated SMB enumeration reveals a welcome email with default credentials. Password spray gives us andrew, who we use...

Welcome Challenge Category: Misc Objective: Gather information on the email and find the flag. suryanandanmajumder@gmail.com I used a popular OSINT framework to perform an email search ...