ISC BIND sends immediate and authoritative NXDOMAIN responses to recursive lookups of LAN addresses by default. This prevents recursive lookup servers from sending meaningless requests to other DNS servers on the Internet. This tutorial will cover how recursive reverse lookups of LAN addresses can be enabled in BIND for lab environments and other special cases.
This post is part of a series about machine learning and artificial intelligence. Click on the blog tag “huskyai” to see related posts.
Overview: How Husky AI was built, threat modeled and operationalized Attacks: Some of the attacks I want to investigate, learn about, and try out I wanted to explore the “Adversarial Robustness Toolbox” (ART) for a while to understand how it can be used to create adversarial examples for Husky AI.
For GrayHat 2020 I was asked to create a short intro video for my Red Team Village talk “Learning by doing: Building and breaking a machine learning system”.
So I put my green screen to good use and recorded this short clip for Red Team Village.
Here is the link to the clip on Twitter:
Hope you like it. :)
The talk will be October, 31st 2020.
Schedule: http://redteamvillage.io/schedule
As the go-to enterprise distributed denial-of-service (DDoS) mitigation experts, our phones have been "ringing off the hook" since the release of the global extortion DDoS campaign sequel. This latest installment of the cybersecurity saga is bigger, badder, and features a broader cast of criminal characters than seen previously with last year's extortion-related activity.
There is a lot of discussion around terms such as red team, attack team, pentest, adversarial engineering or offensive security team and similar ones.
I typically stay away from the (sometimes passionate) discussions that ensue whenever this topic comes up.
Personally, I think a good strategy is to define programs and teams who operate in this space by what services the team (or teams) provide(s) to the organization.
The business groups, blue team, developers, engineers, employees and clients are the customers.
If the title sounds like a trick question, it really depends on who you ask. Semantically, it seems clear that if you take the "edge" and combine it with "computing" you get edge computing. But if you have been reading headlines, you would be justified in having doubts that the answer is that simple.