Forwarded from UNDERCODE COMMUNITY
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦A small Tutorials-ex & -course on exploiting and defending neural networks :
π»π΄π 'π π π π°π π :
2020 repo with 2,2k stars :
π¦ The exercises :
0 - Last Layer Attack
1 - Backdooring
2 - Extracting Information
3 - Brute Forcing
4 - Neural Overflow
5 - Malware Injection
6 - Neural Obfuscation
7 - Bug Hunting
8 - GPU Attack
π¦Download :
> https://github.com/Kayzaks/HackingNeuralNetworks
π¦Required & Packages :
1οΈβ£ Keras: Installing Keras can be tricky. We refer to the official installation guide at https://keras.io/#installation and suggest TensorFlow as a backend (using the GPU-enabled version, if one is available on the machine).
2οΈβ£NumPy, SciPy and scikit-image: NumPy and SciPy are excellent helper packages, which are used throughout all exercises. Following the official SciPy instructions should also install NumPy https://www.scipy.org/install.html. We will also need to install scikit-image for image loading and saving: https://scikit-image.org/docs/stable/install.html.
3οΈβ£PyCuda: PyCuda is required for the GPU-based attack exercise. If no nVidia GPU is available on the machine, this can be skipped. https://wiki.tiker.net/PyCuda/Installation
NLTK: NLTK provides functionalities for natural language processing and is very helpful for some of the exercises. https://www.nltk.org/install.html
#git sources
@UndercodeTesting
@undercodeSecurity
@UndercodeHacking
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦A small Tutorials-ex & -course on exploiting and defending neural networks :
π»π΄π 'π π π π°π π :
2020 repo with 2,2k stars :
π¦ The exercises :
0 - Last Layer Attack
1 - Backdooring
2 - Extracting Information
3 - Brute Forcing
4 - Neural Overflow
5 - Malware Injection
6 - Neural Obfuscation
7 - Bug Hunting
8 - GPU Attack
π¦Download :
> https://github.com/Kayzaks/HackingNeuralNetworks
π¦Required & Packages :
1οΈβ£ Keras: Installing Keras can be tricky. We refer to the official installation guide at https://keras.io/#installation and suggest TensorFlow as a backend (using the GPU-enabled version, if one is available on the machine).
2οΈβ£NumPy, SciPy and scikit-image: NumPy and SciPy are excellent helper packages, which are used throughout all exercises. Following the official SciPy instructions should also install NumPy https://www.scipy.org/install.html. We will also need to install scikit-image for image loading and saving: https://scikit-image.org/docs/stable/install.html.
3οΈβ£PyCuda: PyCuda is required for the GPU-based attack exercise. If no nVidia GPU is available on the machine, this can be skipped. https://wiki.tiker.net/PyCuda/Installation
NLTK: NLTK provides functionalities for natural language processing and is very helpful for some of the exercises. https://www.nltk.org/install.html
#git sources
@UndercodeTesting
@undercodeSecurity
@UndercodeHacking
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
GitHub
GitHub - Kayzaks/HackingNeuralNetworks: A small course on exploiting and defending neural networks
A small course on exploiting and defending neural networks - Kayzaks/HackingNeuralNetworks
Forwarded from UNDERCODE COMMUNITY
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦#Memory Imaging Tools 2020- manage and more-opensources codes :
[Belkasoft Live RAM Capturer](http://belkasoft.com/ram-capturer) - A tiny free forensic tool to reliably extract the entire content of the computerΓ’β¬β’s volatile memory Γ’β¬β even if protected by an active anti-debugging or anti-dumping system
Linux Memory Grabber - A script for dumping Linux memory and creating Volatility profiles.
[Magnet RAM Capture](https://www.magnetforensics.com/free-tool-magnet-ram-capture/) - Magnet RAM Capture is a free imaging tool designed to capture the physical memory of a
suspectΓ’β¬β’s computer. Supports recent versions of Windows
OSForensics - OSForensics can acquire live memory on 32bit and 64bit systems. A dump of an individual processΓ’β¬β’s memory space or physical memory dump can be done
#git sources
@UndercodeTesting
@undercodeSecurity
@UndercodeHacking
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦#Memory Imaging Tools 2020- manage and more-opensources codes :
[Belkasoft Live RAM Capturer](http://belkasoft.com/ram-capturer) - A tiny free forensic tool to reliably extract the entire content of the computerΓ’β¬β’s volatile memory Γ’β¬β even if protected by an active anti-debugging or anti-dumping system
Linux Memory Grabber - A script for dumping Linux memory and creating Volatility profiles.
[Magnet RAM Capture](https://www.magnetforensics.com/free-tool-magnet-ram-capture/) - Magnet RAM Capture is a free imaging tool designed to capture the physical memory of a
suspectΓ’β¬β’s computer. Supports recent versions of Windows
OSForensics - OSForensics can acquire live memory on 32bit and 64bit systems. A dump of an individual processΓ’β¬β’s memory space or physical memory dump can be done
#git sources
@UndercodeTesting
@undercodeSecurity
@UndercodeHacking
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
GitHub
GitHub - halpomeranz/lmg: Script for automating Linux memory capture and analysis
Script for automating Linux memory capture and analysis - halpomeranz/lmg
Forwarded from UNDERCODE COMMUNITY
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦TOP HACKING SOURCES :
#Rogue BTS & CDMA/GSM Traffic Impersonation and Interception
- How to create an Evil LTE Twin/LTE Rogue BTS
How to setup a 4G/LTE Evil Twin Base Station using srsLTE and a USRP SDR device.
- How To Build Your Own Rogue GSM BTS For Fun and Profit
"In this blog post IΓ’β¬β’m going to explain how to create a portable GSM BTS which can be used either to create a private ( and vendor free! ) GSM network or for GSM active tapping/interception/hijacking Γ’β¬Β¦ yes, with some (relatively) cheap electronic equipment you can basically build something very similar to what the governments are using from years to perform GSM interception."
- Practical attacks against GSM networks: Impersonation
"Impersonating a cellular base station with SDR: With the flexibility, relative low cost of Software Defined Radio (SDR) and abundance of open source projects that emulate a cell tower, successfully impersonating a GSM Base Station (BTS) is not a difficult task these days."
- Building a Portable GSM BTS Using BladeRF/PI
"I was always amazed when I read articles published by some hackers related to GSM technology. However, playing with GSM technologies was not cheap until the arrival of Software Defined Radios (SDRs), besides not being something easy to be implemented."
- rtl.sdr.com Tutorial-Analyzing GSM with-Airprobe and Wireshark "The RTL-SDR software defined radio can be used to analyze cellular phone GSM signals, using Linux based tools GR-GSM (or Airprobe) and Wireshark. This tutorial shows how to set up these tools for use with the RTL-SDR."
- Traffic Interception for Penetration Testing Engagements "Within the penetration testing domain quite often we have to deal with different technologies and devices. ItΓ’β¬β’s important to cover all aspects of connectivity of a device being tested which is why we have built a GSM/GPRS interception capability. There are a number of different devices and systems that make use of GSM/GPRS, non-exhaustively we commonly see:"
#git sources
@UndercodeTesting
@undercodeSecurity
@UndercodeHacking
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦TOP HACKING SOURCES :
#Rogue BTS & CDMA/GSM Traffic Impersonation and Interception
- How to create an Evil LTE Twin/LTE Rogue BTS
How to setup a 4G/LTE Evil Twin Base Station using srsLTE and a USRP SDR device.
- How To Build Your Own Rogue GSM BTS For Fun and Profit
"In this blog post IΓ’β¬β’m going to explain how to create a portable GSM BTS which can be used either to create a private ( and vendor free! ) GSM network or for GSM active tapping/interception/hijacking Γ’β¬Β¦ yes, with some (relatively) cheap electronic equipment you can basically build something very similar to what the governments are using from years to perform GSM interception."
- Practical attacks against GSM networks: Impersonation
"Impersonating a cellular base station with SDR: With the flexibility, relative low cost of Software Defined Radio (SDR) and abundance of open source projects that emulate a cell tower, successfully impersonating a GSM Base Station (BTS) is not a difficult task these days."
- Building a Portable GSM BTS Using BladeRF/PI
"I was always amazed when I read articles published by some hackers related to GSM technology. However, playing with GSM technologies was not cheap until the arrival of Software Defined Radios (SDRs), besides not being something easy to be implemented."
- rtl.sdr.com Tutorial-Analyzing GSM with-Airprobe and Wireshark "The RTL-SDR software defined radio can be used to analyze cellular phone GSM signals, using Linux based tools GR-GSM (or Airprobe) and Wireshark. This tutorial shows how to set up these tools for use with the RTL-SDR."
- Traffic Interception for Penetration Testing Engagements "Within the penetration testing domain quite often we have to deal with different technologies and devices. ItΓ’β¬β’s important to cover all aspects of connectivity of a device being tested which is why we have built a GSM/GPRS interception capability. There are a number of different devices and systems that make use of GSM/GPRS, non-exhaustively we commonly see:"
#git sources
@UndercodeTesting
@undercodeSecurity
@UndercodeHacking
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
Medium
How to create an EVIL LTE Twin
Be very careful when playing with any cellular bands. Denial of service attacks can have devastating and sometimes jail worthyβ¦