Adarsh AS's picture

Adarsh AS PRO

adarshxs

AI & ML interests

AI

Recent Activity

liked a dataset 18 days ago
HuggingFaceFW/fineweb-2
liked a dataset 27 days ago
Yuanshi/Subjects200K
liked a dataset about 1 month ago
nyuuzyou/suno
View all activity

Articles

Organizations

Vellore Institute of Technology's profile picture Indian Institute of Science's profile picture Tensoic AI's profile picture Blog-explorers's profile picture Capx AI's profile picture OpenVLM's profile picture Distillation Hugs's profile picture Hugging Face Discord Community's profile picture Association for Computing Machinery - VIT Chapter's profile picture Tensoic AI Internal's profile picture AI Starter Pack's profile picture

adarshxs's activity

New activity in Capx/Agentic-DPO-V0.1 about 2 months ago
published an article 4 months ago
reacted to Csplk's post with 👀 4 months ago
view post
Post
2356
# Offensive Security Reconnaissance Continued with Public Facing Industrial Control System HMIs using Moondream

Building on my previous experiments with Moondream for physical security reconnaissance planning automation (https://huggingface.co/posts/Csplk/926337297827024), I've now turned my attention to exploring the potential of this powerful image-text-text model for offensive security reconnaissance in the realm of Industrial Control Systems (ICS).
ICS HMIs (Human-Machine Interfaces) are increasingly exposed to the public internet, often without adequate security measures in place. This presents a tantalizing opportunity for malicious actors to exploit vulnerabilities and gain unauthorized access to critical infrastructure.

Using Moondream with batch processing ( Csplk/moondream2-batch-processing), I've been experimenting with analyzing public facing ICS ( Csplk/ICS_UIs) HMI ( Csplk/HMI) screenshots from shodan to identify types of exposed ICS system HMIs, how they are operated and how malicious actors with access to these systems could cause damage to physical infrastructure. Feeding images of HMIs and pre-defined text prompts to Moondream batch processing successfully (unconfirmed accuracy levels) extracted information about the underlying systems, including

1. **System type**
2. **Possible Operation Details**
3. **Malicious Actor Outcomes**

Next steps:
* I have a longer and more in depth blog write up in the works that will cover the previous and this post's approaches for experiments for sharing via HF community blog posts soon.
* I plan to continue refining my Moondream-based tool to improve its accuracy and effectiveness in processing public facing ICS HMIs.
* As mentioned before, offensive security with moondream focused HF Space once its fleshed out.

Thanks again to @vikhyatk for the incredible Moondream model. vikhyatk/moondream2
published an article 5 months ago
view article
Article

Agentic Task Delegation - Making Agents whole again

By adarshxs •
• 4