olivier_boschko Profile Banner
Boschko Profile
Boschko

@olivier_boschko

Followers
4K
Following
20K
Media
199
Statuses
2K

just a french canadien | ai red team @HiddenLayerSec | CISSP BSCP CRTL CRTO OSCP eWPTX eCPPT | goofing off @ https://t.co/aWC0YYEp9x

Oppinions are my own
Joined February 2017
Don't wanna be here? Send us removal request.
@olivier_boschko
Boschko
4 months
New blog just dropped 🤠 I've spent hours boiling down why adversarial examples fundamentally exist, distilled down to technical crystal-clear explanations anyone can grasp. This is what I wish someone had given me months ago. Give it a read ❤️ .
Tweet card summary image
boschko.ca
Explore why adversarial examples fundamentally exist & why models are often wrong almost everywhere.
5
30
90
@olivier_boschko
Boschko
4 months
My old team is hiring! Its one of best internal Red Teams IYKYK. Lots of complex & challenging ops in an environment with $1B/yr cyber spend. Huge training budgets & all the toys/gadgets money can buy 😎 the team is seriously amazing. Check out the posting for more details.
@ars3n11
Arsenii P
4 months
🇨🇦🚀 RBC Adversary Emulation is hiring! We're looking for a mid- to senior-level penetration tester / red team operator with a strong consulting background. 📍Toronto (preferred) or anywhere in Canada.
4
3
31
@grok
Grok
22 days
Introducing Grok Imagine.
2K
4K
28K
@olivier_boschko
Boschko
4 months
Great research 🔥 pretty insane level of risk to leave your users exposed to for months. Not implementing an immediate fix & waiting on protocol upgrade feels kinda shitty. The full article + triage timeline & conversation is worth the read.
@shabarkin
Pavel Shabarkin
4 months
On Feb 17 2025 I reported a critical vulnerability to @Scroll_ZKP. $100m+ in TVL was at risk for more than 2 months. Anyone could force Scroll L2 into an indefinite re-org, halting the chain so that no user transactions would be included in blocks and the chain would not move.
0
1
10
@olivier_boschko
Boschko
4 months
Check out @hiddenlayersec newest transferable & universal prompt attack technique coined "Policy Puppetry". It's hot out of the oven & ready for you to use on your next red team 🔥.
Tweet card summary image
hiddenlayer.com
HiddenLayer’s latest research uncovers a universal prompt injection bypass impacting GPT-4, Claude, Gemini, and more, exposing major LLM security gaps.
0
6
28
@olivier_boschko
Boschko
5 months
Happy to announce that I've joined the world's best @HiddenLayerSec! 🔥 I'm absolutely pumped to be securing AI with this insanely stacked & talented team. Good times on the horizon 😎.
13
0
66
@olivier_boschko
Boschko
6 months
So those vulnerabilities I found in that sex toy app 3 years ago. the ones where I could access 60,000+ accounts & all their super private data? They might FINALLY be fixing everything. Super weird experience. Heavily redacted blog post dropping soon if all goes well 👀.
0
0
20
@olivier_boschko
Boschko
7 months
Finally finished reading 🤯 this is 100% a must read. I dont know of anyone else who's consistently finding insane vulns in AI/ML projects & posting writeups/sharing their thought process. Patrick doesn't miss 🎯.
@retr0reg
Ruikai
7 months
My 10k-word writeup on exploiting a heap-overflow in Llama.cpp's RPC Server's Tensor-operation to RCE. This by far is one of the most challenging but fun exploitation I've ever researched on.
1
1
34
@olivier_boschko
Boschko
7 months
Maybe its a mindset issue, but spending time reading AML ATK/DEF papers to midway realize its 99% useless in the real world feels. annoying? Especially when proven w/ unnecessary constraints + the fact that research clusters are so far detatched from "real" deployment clusters.
3
0
9
@olivier_boschko
Boschko
7 months
👀👀👀🔥🔥🔥🔥.
@h4kb4n
h4k
7 months
The entire Shambles product line has been updated with a new version of the SCA (Software Composition Analysis) feature and now includes SBOM export functionality. Accuracy and coverage have been further improved.
Tweet media one
0
0
7
@olivier_boschko
Boschko
8 months
Happy holidays folks! Here's to happiness, love, success, and as always stylish shells 🐚 in the year ahead ❤️
Tweet media one
0
0
28
@olivier_boschko
Boschko
9 months
It's a hard sell
Tweet media one
0
1
7
@olivier_boschko
Boschko
9 months
Dopped a spicy 25-min read exploring adversarial ML 🤠 It's a mix of in-depth & light peppering of the broader field. So much I couldn’t fit (extraction, inversion, poisoning), but I hope it sparks curiosity. Made for learners no fancy background ❤️.
Tweet card summary image
boschko.ca
Explore adversarial attacks on AI/ML models through hands-on challenges on Dreadnode’s Crucible CTF platform.
13
69
210
@olivier_boschko
Boschko
9 months
Dropping a lengthy blog this week on adversarial AI/ML attacks (evasion & kinda-poisoning). Beginner-friendly, covering fundamentals, math & theory. We often overestimate the difficulty of published defenses. Lots of cool attacks can often reduce accuracy to (below) chance
Tweet media one
2
0
35
@olivier_boschko
Boschko
11 months
My colleague @0xd3adbeef_ just published a great blog outlining his methodology in discovering CVE-2024-31227, a DoS in Redis (7.0-7.2.4). It's a great writeup covering fuzzing techniques with AFL++ & writing harnesses for network services .
0
27
82
@olivier_boschko
Boschko
11 months
Okay, I'll stop glazing @dreadnode after this post, but their CTF platform Crucible for adversarial AI/LLM is HANDS DOWN the best out there. It’s free, the challenges are incredible! Truly the perfect place to apply your skills and keep learning 💯🔥
Tweet media one
1
8
59
@olivier_boschko
Boschko
11 months
I've done a heaps of trainings and far too many courses & yet none compare to @dreadnode adversarial Ml training taught by @moo_hax & @monoxgas. This course has been an absolute slingshot into developing non-bullshit AI/ML red teaming capabilities.
Tweet media one
0
1
13
@olivier_boschko
Boschko
11 months
This method allows you to read any file on the NTFS volume regardless of permissions or locks imposed by the OS. Obviously avoid using dumb high-level windows APIs like CreateFile. NTFS ReadFile is too noisy for EDRs.
1
0
11
@olivier_boschko
Boschko
11 months
Not enough people realize how poorly EDRs monitor NTFS 😅 nothing stops you from directly reading the MFT & extracting files from NTFS. Just read raw data from sectors, parse MTF for non-resident files, reconstruct files w/ NTFS structure on disk, extract the file contents 🙂.
9
25
181
@olivier_boschko
Boschko
11 months
I've been on a bit of a hiatus these last few months. Wasn’t sure I'd even come back to infosec at all. Life’s dealt me some shit hands lately. I'll try to slowly pump out blogs & reply to messages. Sorry if I left you on read, wasn’t intentional - just had a lot going on.
13
0
40
@olivier_boschko
Boschko
1 year
You hate to see it 🙃
Tweet media one
2
7
72