Skip to main content

About Sociosploit

Stated simply, most people do not understand technology. That gap in understanding can often be exploited through uniquely tailored social engineering attacks. Sociosploit is a research blog which examines exploitation opportunities on the social web, with a focus on the unique social dynamics at the intersection of technology and social psychology. Sociosploit is an academic research initiative focused specifically on understanding security risks and exploitation potential of the social web. 

$~ Whoami

Justin "Hutch" Hutchens 
is an industry leader in the fields of cybersecurity and artificial intelligence. He is the creator of Sociosploit, a research blog which examines exploitation opportunities on the social web – a confluence of his interests in both technical hacking and social psychology. He is the host of Cyber Cognition, a podcast focused on trends and risks related to emerging artificial intelligence and machine learning technologies. And he is the author of "The Language of Deception: Weaponizing Next Generation AI." Hutch has also spoken at multiple conferences to include HouSecCon, Texas Cyber Summit, ISSA, ToorCon, DEFCON, and RSA Conference.

Other Content

Check out other content from the creator, to include the Cyber Cognition podcast and the Language of Deception book.
As Artificial Intelligence ("AI") continues to accelerate, it is radically transforming how we live our lives and the ways that we experience the world around us.

On each episode of the Cyber Cognition Podcast, we will dive deep into different facets within the fascinating world of AI. We will examine the latest advancements in AI technology, engage in deep conversations about the social, cultural, political, and philosophical implications of this technology, and use this understanding to make informed predictions of what the future may hold (utopian, dystopian, or otherwise).

So whether you're a seasoned tech enthusiast or just curious about the future, the Cyber Cognition Podcast promises a thrilling ride through the incredible and ever-changing world of AI technology.



In The Language of Deception: Weaponizing Next Generation AI, artificial intelligence and cybersecurity veteran Justin Hutchens delivers an incisive and penetrating look at how contemporary and future AI can and will be weaponized for malicious and adversarial purposes. In the book, you will explore multiple foundational concepts to include the history of social engineering and social robotics, the psychology of deception, considerations of machine sentience and consciousness, and the history of how technology has been weaponized in the past. From these foundations, the author examines topics related to the emerging risks of advanced AI technologies, to include:
  • The use of Large Language Models (LLMs) for social manipulation, disinformation, psychological operations, deception and fraud
  • The implementation of LLMs to construct fully autonomous social engineering systems for targeted attacks or for mass manipulation at scale
  • The technical use of LLMs and the underlying transformer architecture for use in technical weapons systems to include advanced next-generation malware, physical robotics, and even autonomous munition systems
Speculative future risks such as the alignment problem, disembodiment attacks, and flash wars.
Perfect for tech enthusiasts, cybersecurity specialists, and AI and machine learning professionals, The Language of Deception is an insightful and timely take on an increasingly essential subject.

Available for Pre-Sale on Amazon -- https://a.co/d/8noFs3o 

Comments

Popular posts from this blog

Bypassing CAPTCHA with Visually-Impaired Robots

As many of you have probably noticed, we rely heavily on bot automation for a lot of the testing that we do at Sociosploit.  And occasionally, we run into sites that leverage CAPTCHA ("Completely Automated Public Turing Test To Tell Computers and Humans Apart") controls to prevent bot automation.   Even if you aren't familiar with the name, you've likely encountered these before. While there are some other vendors who develop CAPTCHAs, Google is currently the leader in CAPTCHA technology.  They currently support 2 products (reCAPTCHA v2 and v3).  As v3 natively only functions as a detective control, I focused my efforts more on identifying ways to possibly bypass reCAPTCHA v2 (which functions more as a preventative control). How reCAPTCHA v2 Works reCAPTCHA v2 starts with a simple checkbox, and evaluates the behavior of the user when clicking it.  While I haven't dissected the underlying operations, I assume this part of the test likely makes determination

Building Bots with Mechanize and Selenium

The Sociosploit team conducts much of its research into the exploitation of social media using custom built bots. On occasion, the team will use public APIs (Application Programming Interfaces), but more often than not, these do not provide the same level of exploitative capabilities that could be achieved through browser automation. So to achieve this end, the Sociosploit team primarily uses a combination of two different Python libraries for building web bots for research. Each of the libraries have their own advantages and disadvantages. These libraries include: Mechanize Pros: Very lightweight, portable, and requires minimal resources Easy to initially configure and install Cuts down on superfluous requests (due to absense of JavaScript) Cons: Does not handle JavaScript or client-side functionality Troubleshooting is done exclusively in text Selenium Pros: Operations are executed in browser, making JavaScript rendering and manipulation easy Visibility of browse

Another "Fappening" on the Horizon?

So in case you aren't fully up-to-speed on useless hacker trivia, "The Fappening" (also sometimes referred to as "Celebgate") was a series of targeted end-user cyber attacks which occurred back in 2014 (which strangely feels like forever in tech years), that resulted in unauthorized access to the iCloud accounts of several prominent celebrity figures.  Following these breaches, photographs (for many including personal sexually explicit or nude photos) of the celebrities were then publicly released online.  Most evidence points to the attack vector being spear phishing email attacks which directed the victims to a fake icloud login site, and then collected the victim's credentials to subsequently access their real icloud accounts. Migration to MFA In response to these events, Apple has made iCloud one of the very few social web services that implements compulsory MFA ("Multi-Factor Authentication").  But while they might be ahead of the indust