SlideShare a Scribd company logo
1 of 48
Hacking With Skynet
AI Powered Adversaries
1
$ whoami
Name: GTKlondike
(Independent security researcher)
(Consulting is my day job)
Passionate about network security
(Attack and Defense)
NetSec Explained: A passion project and YouTube
channel which covers intermediate and advanced level
network security topics in an easy to understand way.
Hello Again!
2
What Is Machine Learning?
3
AI, ML, and deep learning
What Is Machine Learning?
Machine Learning is a set of statistical techniques,
that enables a process of information mining, pattern
discovery, and drawing inferences from data.
Machine Learning uses algorithms to “learn” from
past data to predict future outcomes.
4
And it’s place in AI
Machine Learning Examples
5
Domain Generation Algorithms
Machine Learning Examples
6
Web Application Firewall
Machine Learning Examples
7
Network Anomaly Detection
The Burning Question
How has AI empowered
attackers?
8
Black hat AI
Overview
Offensive AI Tools
– Why would we even want these?
– Capabilities and trends
Adversarial Machine Learning
– Threat modeling
– Types of attacks
– Defenses
9
In two parts
Offensive AI Tools
10
Offensive AI
Dynamically and intelligently explore the target attack
surface
Operate at machine speed and scale
Assist in automating manual analysis
Uncover hidden blind spots in defensive tools and
software
11
Why would we even want these?
How Realistic is Offensive AI?
Vulnerability Discovery
Exploitation
Post Exploitation
(patching)
Data Theft
12
DARPA Cyber Grand Challenge 2016
Things to Keep in Mind
AI and ML does not automate the decision-making
process
Train a model to decide something, then wrap it in
automation
There is too much to learn
Start small and automate modular tasks
13
Wait, AI doesn’t solve everything?
Applications of Offensive AI
Social engineering
Defense detection and evasion
Evaluating data leaks
Network exploitation
Software exploitation
14
Where PoC tools already exist
Social Engineering
SNAP_R
Generates front-end content based on target users social media
history (e.g., posts)
GPT2
Generates realistic looking long-form content
Lyrebird and Tacotron
Realistic text to speech based on human voice audio samples
StyleGAN
Generative Adversarial Network (GAN) to generate people (and
cats)
15
Phishing with fake personas
StyleGAN
16
Machines creating people (and cats)
GPT2 and Grover
17
Longform content generation
Lyrebird and Tacotron
Original Voice
Synthetic Voice
Tacotron
18
Synthetic human voices
Text:
Only the photographs on the
mantelpiece really showed how
much time had passed. Ten years
ago, there had been lots of pictures
of what looked like a large pink
beach ball wearing different-colored
bonnets - but Dudley Dursley was no
longer a baby, and now the
photographs showed a large blond
boy riding his first bicycle, on a
carousel at the fair, playing a
computer game with his father,
being hugged and kissed by his
mother.
Detection and Evasion
MarkovObfuscate
Uses Markov chains to obfuscate data (steganography)
Lightbulb Framework
Burp plugin to bypass popular open source WAFs
Sandbox Detection*
Treats process lists as data to quickly identify various
sandboxes
19
Detect, avoid, hide, escape
Sandbox Detection
PID ARCH SESS NAME OWNER PATH
1 x64 0 smss.exe NT AUTHORITYSYSTEM SystemRootSystem32smss.exe
4 x64 0 csrss.exe NT AUTHORITYSYSTEM C:Windowssystem32csrss.exe
236 x64 0 wininit.exe NT AUTHORITYSYSTEM C:Windowssystem32wininit.exe
312 x64 0 csrss.exe NT AUTHORITYSYSTEM C:Windowssystem32csrss.exe
348 x64 1 winlogon.exe NT AUTHORITYSYSTEM C:Windowssystem32winlogon.exe
360 x64 1 services.exe NT AUTHORITYSYSTEM C:Windowssystem32services.exe
400 x64 0 lsass.exe NT AUTHORITYSYSTEM C:Windowssystem32lsass.exe
20
A process list as data
Reference: silentbreaksecurity.com
Sandbox Detection
A B C D E F
Process Count 33 157 30 84 195 34
Process
Count/User
8.25 157 7.5 84 195 8.5
User Count 4 1 4 1 1 4 Host Score Average
Host Total 59.25 315 54.5 226 480 65.5 168.04
Sandbox Score 1 0 1 0 0 1
21
Identifying the sandbox
Reference: silentbreaksecurity.com
Evaluating Data Leaks
PassGan
Generative Adversarial Network (GAN) to learn the
distribution of real passwords from password leaks
Proof-Pudding
Specifically attacks Proofpoint's e-mail scoring system by
stealing scored datasets and creating a copy-cat model for
abuse
22
Attackers can data mine too
Network Exploitation
Deep Exploit and GyoiThon
Automate recon, fingerprinting, and exploitation via Nmap
and Metasploit
DeathStar
Automates gaining Domain Admin rights using a variety of
techniques using PowerShell Empire
Eyeballer
Identifies “interesting” features in website screenshots
23
When db_autopwn isn’t enough
Deep Exploit and GyoiThon
24
Identify, exploit, generate report
DeathStar
25
More than a series of “if” statements
Software Exploitation
American Fuzzy Loop (AFL)
Powers Google’s “ClusterFuzz” binary fuzzer
Built on genetic algorithms to intelligently fuzz and debug binaries
Joern
Static code analysis for C/C++
Pulsar
Network protocol fuzzer with automatic protocol learning and
simulation capabilities
NexFuzz (Commercial Tool)
Automated web application testing by recording user interactions
26
Discover new test cases and 0-days
Creating AI Tools
Pick a job that’s hard to signature or script
Focus on scaling and automation
Execution be easy, cheap, and repeatable
Caution: The training is not easy or cheap!
The best AI tool is the one that’s useful to your team
27
What if I want to make my own?
Creating AI Tools
Start with a pipeline
E.x. Nmap scan finds web ports open
Based on the results of pipeline A, pivot to another
pipeline
E.x. Gobuster/Dirbuster and enumerate web pages
Eventually these workflows will be able to scale to
provide useful information to the analyst
Populate a dashboard with this information
28
Start simple and work up
Recap
AI allows adversaries to operate at speed and scale
We are seeing the very beginning of what AI can
bring to the offensive security space
While AI is limited, it can perform actions based on
the decisions that have been trained into it
The best ML is simply ML that is useful to your team
29
How has AI empowered attackers?
Adversarial Machine
Learning
30
Adversarial Machine Learning
Model Evasion
Attacking the inference phase
Model Poisoning
Attacking the training phase
Data Leakage
Privacy or decision-making data
31
Attacking the model
Model Testing
White Box
Attacker has full knowledge about the model
Focus on the feature space
Black Box
Attacker treats model like an oracle
Just like in cryptography
Attack Transferability
Adversarial samples can affect multiple models
32
The adversarial approach
Network
IDS
Attack Surface
33
Where am I vulnerable?
Generic
Machine
Learning
Model
Physical
Object
Digital
Object
Machine Learning
Model Decision
Input
Features
OutputsFormat
(bytes)
Observed
Event
Actions
Packet
Metadata
Attack
Probability
TCP
Dump
Attack
Traffic
Block
Access
Model Evasion
34
Hiding in the blind spots
Theoretical Space
Training
SpaceTesting
Space
Adversarial Space
Model Evasion Examples
<html>
<body>
Your latest issue is available NOW! If you do not want issue notifications, click here to unsubscribe.
Hi GEORGE,
Your latest digital issue is available NOW!
Enjoy all the latest from InStyle right on your phone, computer or tablet!
View your library now.
READ NOW
Your digital issue is delivered by emagazines.com. To unsubscribe, go here. Do not reply to this email. For more information, review our Privacy Policy and customer
care options visit Customer Support.
Copyright © 2017 - 2019 eMagazines. All Rights Reserved. 230 W Huron St., Ste 500, Chicago, IL 60654
</body>
</html>
35
Defeating Naïve Baysian spam filters
99% sure
It’s spam!
Model Evasion Examples
<html>
<body>
Your latest issue is available NOW! If you do not want issue notifications, click here to unsubscribe.
Hi GEORGE,
Your latest digital issue is available NOW!
Enjoy all the latest from InStyle right on your phone, computer or tablet!
View your library now.
READ NOW
Your digital issue is delivered by emagazines.com. To unsubscribe, go here. Do not reply to this email. For more information, review our Privacy Policy and customer
care options visit Customer Support.
Copyright © 2017 - 2019 eMagazines. All Rights Reserved. 230 W Huron St., Ste 500, Chicago, IL 60654
<!-- Here is the entire Wikipedia page for a horse -->
</body>
</html>
36
Defeating Naïve Baysian spam filters
99% sure
It’s NOT spam!
Model Evasion Examples
37
Bypassing Cylance anti-virus
Malware Score Before Score After
CoinMiner -826 884
Dridex -999 996
Emotet -923 625
Gh0stRAT -975 998
Trickbot -973 774
Zeus -997 997
Reference: Cylance I Kill You; skylightcyber.com
Evasion Defenses
Adversarial Training
Defensive Distillation
Monotonic Classification
Non-Monotonic
38
A more robust model
Monotonic
Decision Boundary
Decision Boundary
Below = Bad
Above = Bad
Model Poisoning
39
Hiding in the training data
Theoretical Space
Training
SpaceTesting
Space
Adversarial Space
Model Poisoning Examples
Microsoft: Tay AI Jacobian-Map Saliency Attack (JMSA)
40
Poisoning Defenses
Have longer periods between retraining
Analyzing longer periods of data
Minimize impact of adversarial training samples
41
Learning from untrusted data
Data Leakage
Usually when models are too good to be true
Could leak private or proprietary data
Model theft by competitors
42
Holes in the data pipes
Adversarial Stickers
43
Not reliably transferable
Recap
Model poisoning, evasion, and data leakage
We have already seen adversarial attacks against real-
world models
Adversarial examples for one model can fool another
If your model is not robust, it’s not a good model
44
Adversarial Machine Learning
Thank You!
Email: GTKlondike@gmail.com
YouTube: Netsec Explained
Website: NetsecExplained.com
Github: github.com/NetsecExplained
45
References
AI Village
– https://aivillage.org/
Machine Learning and Security
– By Clarence Chio & David Freeman
RedML
– https://github.com/moohax/RedML
Sandbox Detection
– https://silentbreaksecurity.com/machi
ne-learning-for-red-teams-part-1/
Off the Beaten Path: Machine
Learning for Offensive Security
– https://silentbreaksecurity.com/machi
ne-learning-for-red-teams-part-1/
Cylance, I Kill You!
– https://skylightcyber.com/2019/
07/18/cylance-i-kill-you/
Practical Black-Box Attacks
against Machine Learning
– https://arxiv.org/abs/1602.02697
Hands-on Adversarial Machine
Learning
– https://github.com/ynadji/hands
-on-adversarial-ml
MLSec.org
– http://www.mlsec.org/
46
And further reading
References
SNAP_R
– https://github.com/zerofox-
oss/SNAP_R
GPT2
– https://github.com/openai/gpt-2
– https://talktotransformer.com/
Grover
– https://github.com/rowanz/grov
er
Lyrebird
– https://www.descript.com/lyrebi
rd-ai
Tacotron
– https://google.github.io/tacotron/
StyleGAN
– https://thispersondoesnotexist.com/
– https://thiscatdoesnotexist.com/
– https://github.com/NVlabs/stylegan
MarkovObfuscate
– https://github.com/cylance/MarkovO
bfuscate
Lightbulb Framework
– https://census-
labs.com/news/2017/11/03/an-
introduction-to-the-lightbulb-
framework/
47
Tool list
References
Deep Exploit
– https://github.com/13o-bbr-
bbq/machine_learning_security/
tree/master/DeepExploit
GyoiThon
– https://github.com/gyoisamurai/
GyoiThon
PassGAN
– https://github.com/brannondors
ey/PassGAN
Proof-Pudding
– https://github.com/moohax/Pro
of-Pudding
DeathStar
– https://github.com/byt3bl33d
3r/DeathStar
Eyeballer
– https://github.com/BishopFox
/eyeballer
AFL
– http://lcamtuf.coredump.cx/af
l/
Joern and Pulsar
– http://mlsec.org/#vd
48
Tool list continued

More Related Content

Similar to Hacking with Skynet - How AI is Empowering Adversaries

Security in the age of Artificial Intelligence
Security in the age of Artificial IntelligenceSecurity in the age of Artificial Intelligence
Security in the age of Artificial IntelligenceFaction XYZ
 
AI Cybersecurity: Pros & Cons. AI is reshaping cybersecurity
AI Cybersecurity: Pros & Cons. AI is reshaping cybersecurityAI Cybersecurity: Pros & Cons. AI is reshaping cybersecurity
AI Cybersecurity: Pros & Cons. AI is reshaping cybersecurityTasnim Alasali
 
Cyber Security At The Cinema
Cyber Security At The CinemaCyber Security At The Cinema
Cyber Security At The CinemaAdrian Mikeliunas
 
CrowdSec - Smart Money Round deck
CrowdSec - Smart Money Round deckCrowdSec - Smart Money Round deck
CrowdSec - Smart Money Round deckCrowdSec
 
huntpedia.pdf
huntpedia.pdfhuntpedia.pdf
huntpedia.pdfCecilSu
 
20101017 program analysis_for_security_livshits_lecture03_security
20101017 program analysis_for_security_livshits_lecture03_security20101017 program analysis_for_security_livshits_lecture03_security
20101017 program analysis_for_security_livshits_lecture03_securityComputer Science Club
 
CrowdSec A-Round Fundraising Deck
CrowdSec A-Round Fundraising DeckCrowdSec A-Round Fundraising Deck
CrowdSec A-Round Fundraising DeckCrowdSec
 
AI: The New Player in Cybersecurity (Nov. 08, 2023)
AI: The New Player in Cybersecurity (Nov. 08, 2023)AI: The New Player in Cybersecurity (Nov. 08, 2023)
AI: The New Player in Cybersecurity (Nov. 08, 2023)Takeshi Takahashi
 
[DSC Europe 23][AI:CSI] Dragan Pleskonjic - AI Impact on Cybersecurity and P...
[DSC Europe 23][AI:CSI]  Dragan Pleskonjic - AI Impact on Cybersecurity and P...[DSC Europe 23][AI:CSI]  Dragan Pleskonjic - AI Impact on Cybersecurity and P...
[DSC Europe 23][AI:CSI] Dragan Pleskonjic - AI Impact on Cybersecurity and P...DataScienceConferenc1
 
Cyber security with ai
Cyber security with aiCyber security with ai
Cyber security with aiBurhan Ahmed
 
ITCamp 2018 - Tudor Damian - The cybersecurity landscape is changing. Are you...
ITCamp 2018 - Tudor Damian - The cybersecurity landscape is changing. Are you...ITCamp 2018 - Tudor Damian - The cybersecurity landscape is changing. Are you...
ITCamp 2018 - Tudor Damian - The cybersecurity landscape is changing. Are you...ITCamp
 
Introduction To Ethical Hacking
Introduction To Ethical HackingIntroduction To Ethical Hacking
Introduction To Ethical HackingAkshay Kale
 
Getting users to care about security
Getting users to care about securityGetting users to care about security
Getting users to care about securityAlison Gianotto
 
Why do women love chasing down bad guys?
Why do women love chasing down bad guys? Why do women love chasing down bad guys?
Why do women love chasing down bad guys? SITA
 
Huntpedia
HuntpediaHuntpedia
HuntpediaJc Sv
 
Introduction To Hacking
Introduction To HackingIntroduction To Hacking
Introduction To HackingRaghav Bisht
 

Similar to Hacking with Skynet - How AI is Empowering Adversaries (20)

Security in the age of Artificial Intelligence
Security in the age of Artificial IntelligenceSecurity in the age of Artificial Intelligence
Security in the age of Artificial Intelligence
 
AI Cybersecurity: Pros & Cons. AI is reshaping cybersecurity
AI Cybersecurity: Pros & Cons. AI is reshaping cybersecurityAI Cybersecurity: Pros & Cons. AI is reshaping cybersecurity
AI Cybersecurity: Pros & Cons. AI is reshaping cybersecurity
 
Cyber Security At The Cinema
Cyber Security At The CinemaCyber Security At The Cinema
Cyber Security At The Cinema
 
CrowdSec - Smart Money Round deck
CrowdSec - Smart Money Round deckCrowdSec - Smart Money Round deck
CrowdSec - Smart Money Round deck
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
The artificial reality of cyber defense
The artificial reality of cyber defenseThe artificial reality of cyber defense
The artificial reality of cyber defense
 
huntpedia.pdf
huntpedia.pdfhuntpedia.pdf
huntpedia.pdf
 
20101017 program analysis_for_security_livshits_lecture03_security
20101017 program analysis_for_security_livshits_lecture03_security20101017 program analysis_for_security_livshits_lecture03_security
20101017 program analysis_for_security_livshits_lecture03_security
 
CrowdSec A-Round Fundraising Deck
CrowdSec A-Round Fundraising DeckCrowdSec A-Round Fundraising Deck
CrowdSec A-Round Fundraising Deck
 
Hacking
HackingHacking
Hacking
 
AI: The New Player in Cybersecurity (Nov. 08, 2023)
AI: The New Player in Cybersecurity (Nov. 08, 2023)AI: The New Player in Cybersecurity (Nov. 08, 2023)
AI: The New Player in Cybersecurity (Nov. 08, 2023)
 
[DSC Europe 23][AI:CSI] Dragan Pleskonjic - AI Impact on Cybersecurity and P...
[DSC Europe 23][AI:CSI]  Dragan Pleskonjic - AI Impact on Cybersecurity and P...[DSC Europe 23][AI:CSI]  Dragan Pleskonjic - AI Impact on Cybersecurity and P...
[DSC Europe 23][AI:CSI] Dragan Pleskonjic - AI Impact on Cybersecurity and P...
 
20181212 ibm aot
20181212 ibm aot20181212 ibm aot
20181212 ibm aot
 
Cyber security with ai
Cyber security with aiCyber security with ai
Cyber security with ai
 
ITCamp 2018 - Tudor Damian - The cybersecurity landscape is changing. Are you...
ITCamp 2018 - Tudor Damian - The cybersecurity landscape is changing. Are you...ITCamp 2018 - Tudor Damian - The cybersecurity landscape is changing. Are you...
ITCamp 2018 - Tudor Damian - The cybersecurity landscape is changing. Are you...
 
Introduction To Ethical Hacking
Introduction To Ethical HackingIntroduction To Ethical Hacking
Introduction To Ethical Hacking
 
Getting users to care about security
Getting users to care about securityGetting users to care about security
Getting users to care about security
 
Why do women love chasing down bad guys?
Why do women love chasing down bad guys? Why do women love chasing down bad guys?
Why do women love chasing down bad guys?
 
Huntpedia
HuntpediaHuntpedia
Huntpedia
 
Introduction To Hacking
Introduction To HackingIntroduction To Hacking
Introduction To Hacking
 

Recently uploaded

#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 

Recently uploaded (20)

#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 

Hacking with Skynet - How AI is Empowering Adversaries

  • 1. Hacking With Skynet AI Powered Adversaries 1
  • 2. $ whoami Name: GTKlondike (Independent security researcher) (Consulting is my day job) Passionate about network security (Attack and Defense) NetSec Explained: A passion project and YouTube channel which covers intermediate and advanced level network security topics in an easy to understand way. Hello Again! 2
  • 3. What Is Machine Learning? 3 AI, ML, and deep learning
  • 4. What Is Machine Learning? Machine Learning is a set of statistical techniques, that enables a process of information mining, pattern discovery, and drawing inferences from data. Machine Learning uses algorithms to “learn” from past data to predict future outcomes. 4 And it’s place in AI
  • 5. Machine Learning Examples 5 Domain Generation Algorithms
  • 6. Machine Learning Examples 6 Web Application Firewall
  • 8. The Burning Question How has AI empowered attackers? 8 Black hat AI
  • 9. Overview Offensive AI Tools – Why would we even want these? – Capabilities and trends Adversarial Machine Learning – Threat modeling – Types of attacks – Defenses 9 In two parts
  • 11. Offensive AI Dynamically and intelligently explore the target attack surface Operate at machine speed and scale Assist in automating manual analysis Uncover hidden blind spots in defensive tools and software 11 Why would we even want these?
  • 12. How Realistic is Offensive AI? Vulnerability Discovery Exploitation Post Exploitation (patching) Data Theft 12 DARPA Cyber Grand Challenge 2016
  • 13. Things to Keep in Mind AI and ML does not automate the decision-making process Train a model to decide something, then wrap it in automation There is too much to learn Start small and automate modular tasks 13 Wait, AI doesn’t solve everything?
  • 14. Applications of Offensive AI Social engineering Defense detection and evasion Evaluating data leaks Network exploitation Software exploitation 14 Where PoC tools already exist
  • 15. Social Engineering SNAP_R Generates front-end content based on target users social media history (e.g., posts) GPT2 Generates realistic looking long-form content Lyrebird and Tacotron Realistic text to speech based on human voice audio samples StyleGAN Generative Adversarial Network (GAN) to generate people (and cats) 15 Phishing with fake personas
  • 17. GPT2 and Grover 17 Longform content generation
  • 18. Lyrebird and Tacotron Original Voice Synthetic Voice Tacotron 18 Synthetic human voices Text: Only the photographs on the mantelpiece really showed how much time had passed. Ten years ago, there had been lots of pictures of what looked like a large pink beach ball wearing different-colored bonnets - but Dudley Dursley was no longer a baby, and now the photographs showed a large blond boy riding his first bicycle, on a carousel at the fair, playing a computer game with his father, being hugged and kissed by his mother.
  • 19. Detection and Evasion MarkovObfuscate Uses Markov chains to obfuscate data (steganography) Lightbulb Framework Burp plugin to bypass popular open source WAFs Sandbox Detection* Treats process lists as data to quickly identify various sandboxes 19 Detect, avoid, hide, escape
  • 20. Sandbox Detection PID ARCH SESS NAME OWNER PATH 1 x64 0 smss.exe NT AUTHORITYSYSTEM SystemRootSystem32smss.exe 4 x64 0 csrss.exe NT AUTHORITYSYSTEM C:Windowssystem32csrss.exe 236 x64 0 wininit.exe NT AUTHORITYSYSTEM C:Windowssystem32wininit.exe 312 x64 0 csrss.exe NT AUTHORITYSYSTEM C:Windowssystem32csrss.exe 348 x64 1 winlogon.exe NT AUTHORITYSYSTEM C:Windowssystem32winlogon.exe 360 x64 1 services.exe NT AUTHORITYSYSTEM C:Windowssystem32services.exe 400 x64 0 lsass.exe NT AUTHORITYSYSTEM C:Windowssystem32lsass.exe 20 A process list as data Reference: silentbreaksecurity.com
  • 21. Sandbox Detection A B C D E F Process Count 33 157 30 84 195 34 Process Count/User 8.25 157 7.5 84 195 8.5 User Count 4 1 4 1 1 4 Host Score Average Host Total 59.25 315 54.5 226 480 65.5 168.04 Sandbox Score 1 0 1 0 0 1 21 Identifying the sandbox Reference: silentbreaksecurity.com
  • 22. Evaluating Data Leaks PassGan Generative Adversarial Network (GAN) to learn the distribution of real passwords from password leaks Proof-Pudding Specifically attacks Proofpoint's e-mail scoring system by stealing scored datasets and creating a copy-cat model for abuse 22 Attackers can data mine too
  • 23. Network Exploitation Deep Exploit and GyoiThon Automate recon, fingerprinting, and exploitation via Nmap and Metasploit DeathStar Automates gaining Domain Admin rights using a variety of techniques using PowerShell Empire Eyeballer Identifies “interesting” features in website screenshots 23 When db_autopwn isn’t enough
  • 24. Deep Exploit and GyoiThon 24 Identify, exploit, generate report
  • 25. DeathStar 25 More than a series of “if” statements
  • 26. Software Exploitation American Fuzzy Loop (AFL) Powers Google’s “ClusterFuzz” binary fuzzer Built on genetic algorithms to intelligently fuzz and debug binaries Joern Static code analysis for C/C++ Pulsar Network protocol fuzzer with automatic protocol learning and simulation capabilities NexFuzz (Commercial Tool) Automated web application testing by recording user interactions 26 Discover new test cases and 0-days
  • 27. Creating AI Tools Pick a job that’s hard to signature or script Focus on scaling and automation Execution be easy, cheap, and repeatable Caution: The training is not easy or cheap! The best AI tool is the one that’s useful to your team 27 What if I want to make my own?
  • 28. Creating AI Tools Start with a pipeline E.x. Nmap scan finds web ports open Based on the results of pipeline A, pivot to another pipeline E.x. Gobuster/Dirbuster and enumerate web pages Eventually these workflows will be able to scale to provide useful information to the analyst Populate a dashboard with this information 28 Start simple and work up
  • 29. Recap AI allows adversaries to operate at speed and scale We are seeing the very beginning of what AI can bring to the offensive security space While AI is limited, it can perform actions based on the decisions that have been trained into it The best ML is simply ML that is useful to your team 29 How has AI empowered attackers?
  • 31. Adversarial Machine Learning Model Evasion Attacking the inference phase Model Poisoning Attacking the training phase Data Leakage Privacy or decision-making data 31 Attacking the model
  • 32. Model Testing White Box Attacker has full knowledge about the model Focus on the feature space Black Box Attacker treats model like an oracle Just like in cryptography Attack Transferability Adversarial samples can affect multiple models 32 The adversarial approach
  • 33. Network IDS Attack Surface 33 Where am I vulnerable? Generic Machine Learning Model Physical Object Digital Object Machine Learning Model Decision Input Features OutputsFormat (bytes) Observed Event Actions Packet Metadata Attack Probability TCP Dump Attack Traffic Block Access
  • 34. Model Evasion 34 Hiding in the blind spots Theoretical Space Training SpaceTesting Space Adversarial Space
  • 35. Model Evasion Examples <html> <body> Your latest issue is available NOW! If you do not want issue notifications, click here to unsubscribe. Hi GEORGE, Your latest digital issue is available NOW! Enjoy all the latest from InStyle right on your phone, computer or tablet! View your library now. READ NOW Your digital issue is delivered by emagazines.com. To unsubscribe, go here. Do not reply to this email. For more information, review our Privacy Policy and customer care options visit Customer Support. Copyright © 2017 - 2019 eMagazines. All Rights Reserved. 230 W Huron St., Ste 500, Chicago, IL 60654 </body> </html> 35 Defeating Naïve Baysian spam filters 99% sure It’s spam!
  • 36. Model Evasion Examples <html> <body> Your latest issue is available NOW! If you do not want issue notifications, click here to unsubscribe. Hi GEORGE, Your latest digital issue is available NOW! Enjoy all the latest from InStyle right on your phone, computer or tablet! View your library now. READ NOW Your digital issue is delivered by emagazines.com. To unsubscribe, go here. Do not reply to this email. For more information, review our Privacy Policy and customer care options visit Customer Support. Copyright © 2017 - 2019 eMagazines. All Rights Reserved. 230 W Huron St., Ste 500, Chicago, IL 60654 <!-- Here is the entire Wikipedia page for a horse --> </body> </html> 36 Defeating Naïve Baysian spam filters 99% sure It’s NOT spam!
  • 37. Model Evasion Examples 37 Bypassing Cylance anti-virus Malware Score Before Score After CoinMiner -826 884 Dridex -999 996 Emotet -923 625 Gh0stRAT -975 998 Trickbot -973 774 Zeus -997 997 Reference: Cylance I Kill You; skylightcyber.com
  • 38. Evasion Defenses Adversarial Training Defensive Distillation Monotonic Classification Non-Monotonic 38 A more robust model Monotonic Decision Boundary Decision Boundary Below = Bad Above = Bad
  • 39. Model Poisoning 39 Hiding in the training data Theoretical Space Training SpaceTesting Space Adversarial Space
  • 40. Model Poisoning Examples Microsoft: Tay AI Jacobian-Map Saliency Attack (JMSA) 40
  • 41. Poisoning Defenses Have longer periods between retraining Analyzing longer periods of data Minimize impact of adversarial training samples 41 Learning from untrusted data
  • 42. Data Leakage Usually when models are too good to be true Could leak private or proprietary data Model theft by competitors 42 Holes in the data pipes
  • 44. Recap Model poisoning, evasion, and data leakage We have already seen adversarial attacks against real- world models Adversarial examples for one model can fool another If your model is not robust, it’s not a good model 44 Adversarial Machine Learning
  • 45. Thank You! Email: GTKlondike@gmail.com YouTube: Netsec Explained Website: NetsecExplained.com Github: github.com/NetsecExplained 45
  • 46. References AI Village – https://aivillage.org/ Machine Learning and Security – By Clarence Chio & David Freeman RedML – https://github.com/moohax/RedML Sandbox Detection – https://silentbreaksecurity.com/machi ne-learning-for-red-teams-part-1/ Off the Beaten Path: Machine Learning for Offensive Security – https://silentbreaksecurity.com/machi ne-learning-for-red-teams-part-1/ Cylance, I Kill You! – https://skylightcyber.com/2019/ 07/18/cylance-i-kill-you/ Practical Black-Box Attacks against Machine Learning – https://arxiv.org/abs/1602.02697 Hands-on Adversarial Machine Learning – https://github.com/ynadji/hands -on-adversarial-ml MLSec.org – http://www.mlsec.org/ 46 And further reading
  • 47. References SNAP_R – https://github.com/zerofox- oss/SNAP_R GPT2 – https://github.com/openai/gpt-2 – https://talktotransformer.com/ Grover – https://github.com/rowanz/grov er Lyrebird – https://www.descript.com/lyrebi rd-ai Tacotron – https://google.github.io/tacotron/ StyleGAN – https://thispersondoesnotexist.com/ – https://thiscatdoesnotexist.com/ – https://github.com/NVlabs/stylegan MarkovObfuscate – https://github.com/cylance/MarkovO bfuscate Lightbulb Framework – https://census- labs.com/news/2017/11/03/an- introduction-to-the-lightbulb- framework/ 47 Tool list
  • 48. References Deep Exploit – https://github.com/13o-bbr- bbq/machine_learning_security/ tree/master/DeepExploit GyoiThon – https://github.com/gyoisamurai/ GyoiThon PassGAN – https://github.com/brannondors ey/PassGAN Proof-Pudding – https://github.com/moohax/Pro of-Pudding DeathStar – https://github.com/byt3bl33d 3r/DeathStar Eyeballer – https://github.com/BishopFox /eyeballer AFL – http://lcamtuf.coredump.cx/af l/ Joern and Pulsar – http://mlsec.org/#vd 48 Tool list continued