sudo jajos
308 subscribers
111 photos
14 videos
91 links
$ sudo jajos --verbose

Junior AI Engineer@iCogLabs|Oriental Orthodox|Just fascinated about anything fascinating ๐Ÿ˜

Will share my thoughts and journey here
Download Telegram
Eyob Daily
Man-in-the-Middle attack happens when a hacker secretly intercepts communication between two parties without them knowing. You think you're talking directly to someoneโ€ฆ But the attacker is sitting in between, watching and sometimes changing everything.
https://github.com/jajos12/basic_red_teaming

back then just for learning purposes I was experimenting with red teaming attacks ... u can see the details in the repo and one of them was ARP spoofing ... it is a basic MiTM attack ... and it goes as follows:

ARP (Address Resolution Protocol) bridges Layer 2 (MAC addresses) and Layer 3 (IP addresses) of the network stack. When your computer wants to send a packet to 192.168.1.1, it needs to know the MAC address of that IP on the local network. It broadcasts:
"Who has 192.168.1.1? Tell 192.168.1.50"
The device at 192.168.1.1 responds:
"192.168.1.1 is at AA:BB:CC:DD:EE:FF"
Your OS stores this in the ARP cache โ€” a table mapping IP addresses to MAC addresses. All subsequent packets to 192.168.1.1 are sent to MAC AA:BB:CC:DD:EE:FF at the Ethernet layer.

The Fatal Flaw
ARP has zero authentication. The protocol was designed in 1982 (RFC 826) when networks were trusted environments. There is:

โŒ No verification that the sender is who they claim to be
โŒ No cryptographic signing of ARP messages
โŒ No way to distinguish legitimate replies from forged ones
โŒ Devices accept unsolicited ARP replies (no request needed!)
This means any device on the network can lie about who owns any IP address.
โค1๐Ÿ”ฅ1
sudo jajos
https://github.com/jajos12/basic_red_teaming back then just for learning purposes I was experimenting with red teaming attacks ... u can see the details in the repo and one of them was ARP spoofing ... it is a basic MiTM attack ... and it goes as follows:โ€ฆ
There are about 10 attacks described there ... and disclaimer it is for learning purposes only โ—๏ธ๐Ÿ˜ I mean it ...

I intentionally left the 7 uncommited but u can experiment with ARP, DNS spoofing and credential sniffing ....

If u have found something useful don't forget to give it โญ๏ธ https://github.com/jajos12/basic_red_teaming
This is so shocking

@byte_philosopher
๐Ÿ’”1๐Ÿ˜1
Yostina | Bytephilosopher
This is so shocking @byte_philosopher
I enjoyed A2SV(I was Generation 6) - but when I was leaving it - u know it was a shock also for me ... bcha Emre tchilaleh ... but u are surrounded with ignorant ... bcha mnm albel
๐Ÿ‘3
Claude think I am a robot because I am from Ethiopia .. ๐Ÿ˜‚ it looped 5 times asking me again and again lol ...

VPN the life savior be it "app unavailable" or "u are robot" ๐Ÿ˜‚
๐Ÿ˜5
แˆ˜แˆแŠซแˆ แˆฐแŠ•แ‰ แ‰ต ๐Ÿ’›

แŠฅแŠ” แ‰ฐแŠ›แˆ แŠ แŠ•แ‰€แˆ‹แ‹แˆแˆแค แŠฅแŒแ‹šแŠ แ‰ฅแˆ”แˆญแˆ แ‹ฐแŒแŽแŠ›แˆแŠ“ แАแ‰ƒแˆแข
แŠจแˆšแŠจแ‰ฅแ‰กแŠ แŠจแŠ แŠฅแˆ‹แ แˆ•แ‹แ‰ฅ แŠ แˆแˆแˆซแˆแข

แˆ˜แ‹ 3 :5-6

@byte_philosopher
โคโ€๐Ÿ”ฅ5
The jealous person would prefer to suffer innumerable troubles rather than to see his neighbor in good repute, even if the cause of the good repute were to benefit him also. What could be more wretched than such a person?

St. John Chrysostom
โค9
sudo jajos
https://youtu.be/tpIctyqH29Q?si=eKoLPExAXx6aiHF4 This is an insane playlist for anyone from scratch to understand how computers work in macro level ... and u know literally it is for everyone ...
https://www.coursera.org/learn/build-a-computer

This is also very valuable material ... u will build ur own computer ...

I will take it ... I think my financial aid have expired(after 6 months it expires) and I should use another acc to apply ... bcha It is insane like it is project based betam ena at every module they give like ~ 2 hrs for lecture and ~ 3 - 6 hrs for implementing the things learnt
๐Ÿ”ฅ2
sudo jajos
https://www.coursera.org/learn/build-a-computer This is also very valuable material ... u will build ur own computer ... I will take it ... I think my financial aid have expired(after 6 months it expires) and I should use another acc to apply ... bcha Itโ€ฆ
now someone's gonna say ... "why even bother learning this stuff when ai is just gonna surpass us anyway"

bro. if we don't understand how things work at a fundamental level, we don't have a long future in this field. ai doesn't make deep knowledge useless โ€” it makes it more valuable

like gpu design, computer architecture ... these things directly affect how ai is built and how far it can go. the people who will actually push things forward aren't just the ones using the tools, they're the ones who understand what's underneath well enough to rethink the tools entirely

we need to go beyond surface level and start thinking like researchers. and that starts with actually knowing how things work
๐Ÿ”ฅ4
sudo jajos
now someone's gonna say ... "why even bother learning this stuff when ai is just gonna surpass us anyway" bro. if we don't understand how things work at a fundamental level, we don't have a long future in this field. ai doesn't make deep knowledge uselessโ€ฆ
was studying page replacement algorithms and had a thought ...

quick context first: your computer's RAM is limited. the OS creates an illusion that every program has way more memory than physically exists โ€” it secretly stores some of it on disk. but when a program needs a page that's currently on disk, the OS has to bring it in ... and if RAM is full, it has to kick something out first

which page do you kick out? that's the page replacement problem

the classic algorithms (LRU, CLOCK ...) are hand-crafted heuristics. I bet many of u know abt LRU - it evicts the least recently used page basically ...

the theoretically perfect one โ€” OPT โ€” evicts whichever page won't be needed for the longest time. but it requires knowing the future lol

so I was thinking ... why not RL?

โ€” state: recent page access history
โ€” action: which page to evict on a fault
โ€” reward: +1 hit, -1 fault

RL could learn to approximate OPT from patterns in the workload instead of needing oracle knowledge

turns out this is a real research area called learning-augmented algorithms โ€” you take something like LRU and plug in an ML predictor on top. good predictor โ†’ approach OPT, bad predictor โ†’ fall back to LRU gracefully

OS exam tomorrow and my brain is doing research ideation ๐Ÿ˜ญ
๐Ÿ˜3
And this was the ending ๐Ÿ˜ญ๐Ÿ˜ญ

แ‹ซแ‹ แŠ–แˆฎแˆ แŠ แˆแˆฐแˆซ แŒแŠ• it hurts ๐Ÿ˜๐Ÿ˜ญ
๐Ÿ˜4
Tech Nerd
I wanna give a shoutout to this Amharic youtube channel .. the creator clearly puts a lot of effort into researching each video, and the documentaries are genuinely top notch. A lot of the content focuses on exposing scams and real issues, which makes itโ€ฆ
Yeah they are awesome ...

the amharic fern ๐Ÿ”ฅ ... they style + content ... แ‰ตแŠ•แˆฝ แŒแŠ• แˆŒแˆ‹ แ‰ฐแˆซแŠช แ‰ขแˆ†แŠ• แŒธแ‹ต แАแ‹
๐Ÿ‘1๐Ÿ˜1
Forwarded from Dagmawi Babi
If you think you shouldn't make your bed because it will just get messy again, I have terrible news about literally every aspect of life.
โค1
sudo jajos
now someone's gonna say ... "why even bother learning this stuff when ai is just gonna surpass us anyway" bro. if we don't understand how things work at a fundamental level, we don't have a long future in this field. ai doesn't make deep knowledge uselessโ€ฆ
Ontogeny Recapitulates Phylogeny
Each new class of computer (mainframe โ†’ mini โ†’ PC โ†’ smartphone โ†’ smart card) goes
through the same evolutionary stages as its predecessors. Assembly โ†’ high-level
languages. No OS โ†’ batch โ†’ multiprogramming โ†’ timesharing. No disk โ†’ single directory
โ†’ hierarchical file system. Technologies become obsolete, then return as hardware
changes. Example: caches appeared when CPUs got faster than RAM. If RAM ever
became faster than CPU, caches would vanish. Study 'obsolete' ideas โ€” they may return.

From Andrew Tanenbaum's OS Book
๐Ÿ‘Œ1
sudo jajos
Ontogeny Recapitulates Phylogeny Each new class of computer (mainframe โ†’ mini โ†’ PC โ†’ smartphone โ†’ smart card) goes through the same evolutionary stages as its predecessors. Assembly โ†’ high-level languages. No OS โ†’ batch โ†’ multiprogramming โ†’ timesharing.โ€ฆ
แ‹แ‹ญ แ‰ แ‹šแˆ… แˆฐแ‹“แ‰ต OS แˆแŠ“แˆแŠ• แŠฅแ‹ซแˆแŠฉ แŠ แˆแŒจแ‰…แ‰ƒแ‰ฝแˆ

"แ‰ แˆฐแˆ‹แˆ แŠฅแ‰ฐแŠ›แˆˆแˆแฅ แŠ แŠ•แ‰€แˆ‹แ‹แˆˆแˆแˆแค แŠ แ‰คแ‰ฑแฅ แŠ แŠ•แ‰ฐ แ‰ฅแ‰ปแˆ…แŠ• แ‰ แŠฅแˆแАแ‰ต แŠ แˆณแ‹ตแˆจแŠธแŠ›แˆแŠ“แข"

โ€” แˆ˜แ‹แˆ™แˆจ แ‹ณแ‹Šแ‰ต 4:8

"แˆˆแŠ แŠ•แ‰ฐ แˆแŒฅแˆจแŠธแŠ“แˆแŠ“ แˆแ‰ฃแ‰ฝแŠ• แ‰ แŠ แŠ•แ‰ฐ แŠฅแˆตแŠซแˆ‹แˆจแˆ แ‹ตแˆจแˆต แ‹•แˆจแแ‰ต แ‹จแˆˆแ‹แˆแข แŒŒแ‰ณ แˆ†แ‹ญแฅ แŠ แŠ•แ‰ฐแŠ• แ‹จแˆšแˆˆแˆแŠ•แˆ… แˆ›แŠ• แАแ‹? แŠ แŠ•แ‰ฐแŠ• แˆ˜แŒฅแˆซแ‰ต แˆซแˆฑ แ‹จแŠฅแˆแАแ‰ต แˆแˆแŠญแ‰ต แАแ‹แค แŠฅแˆแАแ‰ตแŠ•แˆ แ‹จแˆฐแŒ แŠธแŠ• แŠ แŠ•แ‰ฐ แАแˆ…แข แАแแˆด แˆ†แ‹ญแฅ แŠ แˆแŠ• แŠฅแˆจแŠแค แ‹จแˆแŒ แˆจแˆฝ แŠ แˆแˆจแˆณแˆฝแˆแŠ“แข แŠจแ‹‹แŠญแ‰ฅแ‰ตแŠ• แ‰ แŠฅแŒ แ‹จแ‹ซแ‹˜ แŠฅแˆฑ แ‹›แˆฌ แˆŒแˆŠแ‰ตแˆฝแŠ•แˆ แ‰ แŠฅแŒ แ‹ญแ‹Ÿแˆแข"

โ€” St. Augustine - Confessions

"แŠ แŠ•แ‹ต แ‹ˆแŠ•แ‹ตแˆ แŠ แ‰ฃ แ–แ‹ญแˆ˜แŠ•แŠ• แŠฅแŠ•แ‹ฒแˆ… แˆฒแˆ แŒ แ‹จแ‰ƒแ‰ธแ‹แฆ 'แŠจแˆ˜แ‰ฐแŠ›แ‰ด แ‰ แŠแ‰ต แˆแŠ• แˆ‹แ‹ตแˆญแŒ?' แˆฝแˆ›แŒแˆŒแ‹แˆแฆ 'แ‰ แ‹แˆตแŒฅแˆ… แˆตแˆ‹แˆˆแ‹ แŠฅแˆตแ‰ตแŠ•แ‹แˆต แŠฅแŒแ‹šแŠ แ‰ฅแˆ”แˆญแŠ• แŠ แˆ˜แˆตแŒแŠ•แค แ‹ซ แ‰ฅแ‰ป แ‰ แ‰‚ แАแ‹' แŠ แˆ‰แ‰ตแข"

โ€” แŠจแ‰ แˆจแˆƒ แŠ แ‰ฃแ‰ถแ‰ฝ (Desert Fathers)
โคโ€๐Ÿ”ฅ10โค1