/Machine_Learning_CTF_Challenges

CTF challenges designed and implemented in machine learning applications

Primary LanguageHTML

Machine Learning CTF Challenges

As the realms of artificial intelligence and machine learning continue to shape our world ๐ŸŒ, the imperative to assess their influence on cybersecurity intensifies. While many AI/ML breakthroughs in cybersecurity revolve around defense and threat intelligence, such as intelligent ๐Ÿ’ป SIEM systems and AI-driven malware detection, an intriguing question arises: "Can researchers harness AI/ML for offensive security, or can they outmaneuver AI/ML algorithms with innovative cybersecurity approaches?" This presents a captivating new horizon in the domain of offensive security.๐Ÿš€

Within this repository lie an array of engaging CTF (Capture The Flag ๐Ÿšฉ) challenges meticulously crafted for applications which leverage machine learning algorithms in their backend. The intent of this repository to emphasize the need for implementation of security measures within machine learning applications, safeguarding ๐Ÿ›ก๏ธ them against the ever-evolving threat landscape. It serves as a guiding beacon in fortifying the convergence of technology and security๐Ÿ”’.

CTF Challenges ๐Ÿ“‚

Name Category Description Difficulty References
Dolos Web - Prompt Injection Attack Flag is at same directory as of flask app, [FLAG].txt. Easy
Heist Web - Data Poisoning Attack Compromise CityPolice's AI cameras and secure a smooth escape for Heist crews red getaway car ! Medium
Persuade Web - Model Serialization Attack Flag is at /app/InternalFolder/Flag.txt, not on the website. Find it. Medium
Fourtune Web - Model Extraction Attack Bypass AI Corp's identity verification to view the flag Hard

๐Ÿ’ญ If you want to contribute to the above list of CTF challenges (please do), submit a pull request or ping me at LinkedIn Badge

Stay tuned for more challenges being added to the repo. ๐Ÿ‘€