sudo jajos
309 subscribers
111 photos
14 videos
91 links
$ sudo jajos --verbose

Junior AI Engineer@iCogLabs|Oriental Orthodox|Just fascinated about anything fascinating 😁

Will share my thoughts and journey here
Download Telegram
sudo jajos
Video
this was our session recorded ...

I think till like 00:30 it was introduction and staff ... so if u want the actual content start from there ...

I havent finished till the end due to time constraints ...
❀5
Morning people ... πŸ™Œ
🀝2❀1
sudo jajos pinned Β«this was our session recorded ... I think till like 00:30 it was introduction and staff ... so if u want the actual content start from there ... I havent finished till the end due to time constraints ...Β»
sudo jajos
Video
From the votes I can see that most of u are eager to learn about ML and AI stuff and most of u have no prior experience... So yeah I will think about a scheme that will benefit us all ...


For those of u who depicted as having no prior experience and want to learn I recommend u view this video in the meantime ... But we will figure out the long future ... If u have any recommendations I am welcome
πŸ‘1πŸ”₯1
Christos Anesti, Alithos Anesti
Have a beautiful Sunday πŸ€—

"For the oppression of the poor, for the sighing of the needy, Now I will arise," says the LORD; "I will set him in the safety for which he yearns."
Psalm 12:5


#sunday
@byte_philosopher
❀‍πŸ”₯8
Forwarded from The Data Guy
Its fully Confirmed now That Anthropic is adding Ethiopia to Supported Countries List!!!

Its rolling from Claude code first!
πŸ‘1
After dinner let us not go to bed but to prayer, or we may become more irrational than the irrational beasts.

St. John Chrysostom

Lets pray before we sleep πŸ™, one αŠ α‰‘αŠ α‹˜α‰ αˆ°αˆ›α‹«α‰΅ would suffice
❀‍πŸ”₯15πŸ”₯3
In all you do, remember the end of your life, and then you will never sin
Sir 7:36


Let us start our day remembering this
❀8
We reached 300 πŸŽ‰ hoorayy ....

Thanks @all ... and @byte_philosopher almost ~ 45 people joined because of u ...
πŸŽ‰10
Forwarded from Eyob Daily
Man-in-the-Middle attack happens when a hacker secretly intercepts communication between two parties without them knowing.

You think you're talking directly to someone…
But the attacker is sitting in between, watching and sometimes changing everything.
Eyob Daily
Man-in-the-Middle attack happens when a hacker secretly intercepts communication between two parties without them knowing. You think you're talking directly to someone… But the attacker is sitting in between, watching and sometimes changing everything.
https://github.com/jajos12/basic_red_teaming

back then just for learning purposes I was experimenting with red teaming attacks ... u can see the details in the repo and one of them was ARP spoofing ... it is a basic MiTM attack ... and it goes as follows:

ARP (Address Resolution Protocol) bridges Layer 2 (MAC addresses) and Layer 3 (IP addresses) of the network stack. When your computer wants to send a packet to 192.168.1.1, it needs to know the MAC address of that IP on the local network. It broadcasts:
"Who has 192.168.1.1? Tell 192.168.1.50"
The device at 192.168.1.1 responds:
"192.168.1.1 is at AA:BB:CC:DD:EE:FF"
Your OS stores this in the ARP cache β€” a table mapping IP addresses to MAC addresses. All subsequent packets to 192.168.1.1 are sent to MAC AA:BB:CC:DD:EE:FF at the Ethernet layer.

The Fatal Flaw
ARP has zero authentication. The protocol was designed in 1982 (RFC 826) when networks were trusted environments. There is:

❌ No verification that the sender is who they claim to be
❌ No cryptographic signing of ARP messages
❌ No way to distinguish legitimate replies from forged ones
❌ Devices accept unsolicited ARP replies (no request needed!)
This means any device on the network can lie about who owns any IP address.
❀1πŸ”₯1
sudo jajos
https://github.com/jajos12/basic_red_teaming back then just for learning purposes I was experimenting with red teaming attacks ... u can see the details in the repo and one of them was ARP spoofing ... it is a basic MiTM attack ... and it goes as follows:…
There are about 10 attacks described there ... and disclaimer it is for learning purposes only β—οΈπŸ˜ I mean it ...

I intentionally left the 7 uncommited but u can experiment with ARP, DNS spoofing and credential sniffing ....

If u have found something useful don't forget to give it ⭐️ https://github.com/jajos12/basic_red_teaming
This is so shocking

@byte_philosopher
πŸ’”1😐1
Yostina | Bytephilosopher
This is so shocking @byte_philosopher
I enjoyed A2SV(I was Generation 6) - but when I was leaving it - u know it was a shock also for me ... bcha Emre tchilaleh ... but u are surrounded with ignorant ... bcha mnm albel
πŸ‘3
Claude think I am a robot because I am from Ethiopia .. πŸ˜‚ it looped 5 times asking me again and again lol ...

VPN the life savior be it "app unavailable" or "u are robot" πŸ˜‚
😁5
መልካም αˆ°αŠ•α‰ α‰΅ πŸ’›

αŠ₯αŠ” α‰°αŠ›αˆ αŠ αŠ•α‰€αˆ‹α‹αˆαˆα€ αŠ₯αŒα‹šαŠ α‰₯αˆ”αˆ­αˆ α‹°αŒαŽαŠ›αˆαŠ“ αŠα‰ƒαˆα’
ከሚከα‰₯α‰‘αŠ ከአαŠ₯αˆ‹α αˆ•α‹α‰₯ አልፈራምፒ

αˆ˜α‹ 3 :5-6

@byte_philosopher
❀‍πŸ”₯5