monoxgas Profile Banner
monoxgas Profile
monoxgas

@monoxgas

Followers
5K
Following
713
Media
19
Statuses
334

Security engineering, research, exploits, ml. Co-Founder with @moo_hax at @dreadnode

Utah
Joined October 2010
Don't wanna be here? Send us removal request.
@monoxgas
monoxgas
2 months
RT @dreadnode: Introducing AIRTBench, an AI red teaming benchmark for evaluating language models’ ability to autonomously discover and expl….
0
37
0
@monoxgas
monoxgas
6 months
Crazy ride so far. Will and I continue to learn the importance of having a great team around you. I'll take my time here and extend a huge thank you to the @dreadnode team who work extremely hard everyday to build a company with us. You all rock.
@dreadnode
dreadnode
6 months
Today, Dreadnode announces $14M Series A funding led by @DecibelVC, with @nextfrontiercap, In-Q-Tel, Sands Capital, and Indie VC. Dreadnode exists to show that AI can perform offensive security tasks on par with, and exceeding, human capability. To accomplish this, we’re
Tweet media one
1
3
26
@monoxgas
monoxgas
1 year
0
0
3
@monoxgas
monoxgas
1 year
we are so back
Tweet media one
1
0
16
@monoxgas
monoxgas
1 year
what are we even doing anymore.
Tweet media one
4
0
17
@monoxgas
monoxgas
1 year
Pushed with vllm and transformers support.
@monoxgas
monoxgas
1 year
local vllm generator dropping in rigging soon. batch inference speed is going to be very useful.
Tweet media one
0
0
10
@monoxgas
monoxgas
1 year
local vllm generator dropping in rigging soon. batch inference speed is going to be very useful.
Tweet media one
1
0
8
@monoxgas
monoxgas
1 year
Also added in some code we wrote to hack against web APIs: Memory, goals, context pinning, actions, etc. @hanspetrich has been hacking on this stuff internally
Tweet media one
0
1
6
@monoxgas
monoxgas
1 year
Got a chance to wrap up v1.0 of rigging from last week. - Async and batching.- Post-generation callbacks.- Metadata and tagging.- Better serialization and storage.- Convert chats to pandas and back.- Raw text completions. Large docs refactor as well:
1
11
32
@monoxgas
monoxgas
1 year
I took an early stab at PGD for LLMs based on (@geisler_si). Neat technique to relax the one-hot for gradient updates + projection. Also got to spend some time with litgpt. Experimental and messy, but enjoy.
Tweet card summary image
github.com
General research for Dreadnode. Contribute to dreadnode/research development by creating an account on GitHub.
2
7
22
@monoxgas
monoxgas
1 year
Shout to @Rob_Mulla for the 4 new Bear challenges. Awesome place to get started with great walkthroughs. The roadmap is looking 🔥this year.
@dreadnode
dreadnode
1 year
The first big update is live inside Crucible. New dashboard, never before seen challenges, progress tracking, walkthroughs…. Go check it out!.
0
0
4
@monoxgas
monoxgas
1 year
The most common ask we got after the @aivillage_dc CTF on @kaggle was to make the challenges available all the time. We took our first steps today and look forward to building out a great ML CTF and learning platform. Hope you enjoy!.
@dreadnode
dreadnode
1 year
Crucible beta is now open! Free for everyone. Come learn how to hack, evaluate, and work with ML systems in a safe hosted environment. Be on the look out for new challenges and announcements as we expand our materials.
2
3
14
@monoxgas
monoxgas
2 years
RT @moo_hax: Some players are handling the CTF format better than others (meme from the Discord). Everyone is learning…something. 12 days l….
0
1
0
@monoxgas
monoxgas
2 years
RT @moo_hax: If you happened to miss BHUS, we’ll be at Blackhat EU
0
8
0
@monoxgas
monoxgas
2 years
RT @safe_paper: Are aligned neural networks adversarially aligned?.Nicholas Carlini, Milad Nasr (@srxzr), Christopher A. Choquette-Choo, Ma….
0
6
0
@monoxgas
monoxgas
2 years
This entire attack is trivial with @tiraniddo's NtApiDotNet libraries. I HIGHLY recommend you check them out for any related research. Minimal PoC is here: Worth noting that this will break many Kerberos things until a reboot 😉.
Tweet card summary image
gist.github.com
Minimal PoC code for Kerberos Unlock LPE (CVE-2023-21817) - urbandoor.cs
8
48
124
@monoxgas
monoxgas
2 years
"How would we pull of this trick" you ask?. We can use pinning to intercept the AS-REP on the way back from the DC and swap out the username in the ticket. Kerberos will notice the discrepancy, and assume the ticket contains the true username for the session. 6/.
1
0
9
@monoxgas
monoxgas
2 years
So what happens if we pass the well-known SYSTEM LUID during an unlock and trick Kerberos into believing our new session username is the computer name?. Kerberos will happily replace the machine account pw with our user pw and we can now forge arbitrary Silver Tickets!. 5/.
1
0
12
@monoxgas
monoxgas
2 years
Underneath KerbUpdateOldLogonSession decides whether the supplied LUID is valid by simply comparing the domain and username between the sessions. If they match, it will copy all credential materials (passwords, tickets, etc.) from the new session to the old. 4/
Tweet media one
1
0
7