top of page
Dave Gilmore's Tech Blog


Understanding Integrity-based Cyber Attacks Against AI Systems - Research Paper by David Gilmore
I am delighted to present my research paper on integrity based cyber attacks on AI systems. Please feel free to download a copy by...
Mar 16, 20241 min read
Â


Red Teaming LLM's - Automated Pentesting Large Language Models
As more and more tools appear on Github relating to pen testing large language models I thought it would be good to test some of these...
Mar 10, 20241 min read
Â


Let's Hack Some LLM's (Large Language Models)
I have learnt a lot about machine learning and LLM's over the past year, I have taken a handful of courses and I think I have a good...
Feb 14, 20242 min read
Â


Microsoft Security, Compliance, and Identity Badge
Today I earned my "Microsoft Security, Compliance, and Identity Fundamentals: Describe the concepts of security, compliance, and...
Jan 30, 20241 min read
Â


Exploiting GitLab - CVE-2023-7028
In this article I will demonstrate how an attacker could craft a malicious Python script to initiate a password reset of a GitLab account...
Jan 18, 20243 min read
Â


Automating Kali Updates With a Desktop Icon
OK I am getting ready for my shift at 8:30am but my Bash updater script has been on my mind, gotta make it slicker and easier for newbs. ...
Jan 4, 20241 min read
Â


Automating Nmap Scans with Bash Scripting
Today I am revisiting good old Bash scripting in Kali, I have put so much effort in to learning Python in 2023 I had forgotten just how...
Jan 3, 20241 min read
Â


Juypter Notebooks for Cyber Security
Jupyter Notebooks is an open-source web application that allows you to create and share documents containing live code, equations,...
Dec 3, 20231 min read
Â


Testing Basic Concepts and Procedures for Cybersecurity
This was a University assignment I completed in May this year. Part A Task 1: Configure and test penetration testing Environment a. ...
Nov 28, 20235 min read
Â


Implement Basic Network Infrastructure for an Organisation
TASK: Setup a basic network infrastructure and setup PFsense. The lab contains three nested virtual machines represented by the following...
Nov 28, 20234 min read
Â


AWS University Project
In one of my University projects this year we are tasked with setting up a basic AWS infrastructure. Let's take a look at the questions...
Nov 28, 20234 min read
Â


Delving in to Docker
Today I have continued my journey with Docker. To be honest I did try and learn Docker about 6 months ago and I have completed a Docker...
Nov 27, 20231 min read
Â


Basic Malware Hunting with Azure VM's and Splunk
In today's post we are hunting some malware that has infected a Windows 10 virtual machine in Azure. In order to learn about malware...
Nov 26, 20237 min read
Â


Testing Snort IDS/IPS on an Ubuntu web server
Image designed with GPT4 Dall-e With just one command we can launch Snort on Ubuntu and begin monitoring network traffic. In this lab...
Nov 26, 20231 min read
Â


Book Expert - My AI Book App Powered by GPT4 Vision
Over the past couple of weeks I have been working on a book expert application that can view a book cover and then, based on my...
Nov 25, 20231 min read
Â


Quishing Resurgence
So I saw an article online about the resurgence of quishing. As phishing attacks evolve, cybercriminals are turning to advanced...
Nov 23, 20232 min read
Â


Linux Command Line AI
A few days ago I presented my Linux command line AI using Open AI's GPT's. NEXA is a dedicated GPT that is programmed to respond to any...
Nov 19, 20231 min read
Â


How to download and install Snort for Windows (The Easy Way)
Prerequisites Snort requires the following dependencies: Microsoft C++ Redistributable Runtimes https://www.techpowerup.com/download/visu...
Nov 19, 20232 min read
Â


Download Snort Windows Configuration File
Are you looking for a pre configured Snort for Windows config file? Then I may have what you are looking for! Please note this will...
Nov 18, 20231 min read
Â


Demonstration of cryptographic authentication keys for comms between Windows and Linux over SSH
In this video I demonstrate my cryptographic key setup in my virtual lab. At first you will see my Windows 10 end point device which has...
Nov 15, 20231 min read
Â
bottom of page