unshadow commited on
Commit
206919c
1 Parent(s): 43c87cd

Update README.md

Browse files
Files changed (1) hide show
  1. README.md +34 -31
README.md CHANGED
@@ -22,36 +22,35 @@ tags:
22
  Lily is a cybersecurity and hacking instructor and assistant. She is a Mistral Fine-tune model with 22,000 hand-crafted cybersecurity and hacking-related data pairs. This dataset was then run through an LLM to provide additional context, personality, and styling to the outputs.
23
 
24
  The dataset focuses on general knowledge in most areas of cybersecurity. These included, but are not limited to:
25
-
26
- Advanced Persistent Threats (APT) Management,
27
- Architecture and Design,
28
- Business Continuity and Disaster Recovery,
29
- Cloud Security,
30
- Communication and Reporting,
31
- Cryptography and PKI,
32
- Data Analysis and Interpretation,
33
- Digital Forensics,
34
- Governance, Risk, and Compliance,
35
- Hacking,
36
- Identity and Access Management,
37
- Incident Management and Disaster Recovery Planning,
38
- Incident Response,
39
- Information Security Management and Strategy,
40
- Legal and Ethical Considerations,
41
- Malware Analysis,
42
- Networking,
43
- Penetration Testing and Vulnerability Assessment,
44
- Physical Security,
45
- Regulatory Compliance,
46
- Risk Management,
47
- Scripting,
48
- Secure Software Development Lifecycle (SDLC),
49
- Security in Emerging Technologies,
50
- Security Operations and Monitoring,
51
- Social Engineering and Human Factors,
52
- Software and Systems Security,
53
- Technologies and Tools,
54
- Threats, Attacks, and Vulnerabilities,
55
 
56
  ## Training
57
 
@@ -74,7 +73,11 @@ The response generated from the above prompt:
74
 
75
  > Oh, hello there! You know, it's great to dive into the depths of cybersecurity with you. So, you want to know about evil twin wireless attacks? Well, allow me to explain, my geeky friend!
76
  >
77
- > Evil twin attacks, also known as wireless masquerading, operate just like regular wireless access points (APs). Here's how it works: a nefarious individual sets up a new wireless AP with a signal and name that impersonate a legitimate network. They cleverly utilize the same SSID (Service Set Identifier) as the target network, so it tricks unsuspecting victims into connecting to this malicious AP instead.\n\nOnce a victim unknowingly connects to the fake AP, the attacker gains access to their network traffic. They can observe, intercept, and even manipulate this data, making it a real headache for those concerned about network security. It's like having someone peeking into your private conversations! Not cool, right?\n\nBut the attack doesn't end there. The imposter AP can also redirect the traffic directly through the attacker's computer, allowing them to perform other network-based attacks such as phishing, man-in-the-middle, or even DNS spoofing. It's like a whole cyber-playground for the bad guys!
 
 
 
 
78
  >
79
  > Now, how can we protect ourselves against these sneaky attackers? Well, my cyber-savvy companion, one effective method is the employment of WPA3 encryption. It adds an extra layer of security to wireless networks, making it much harder for attackers to intercept and manipulate our data.
80
  >
 
22
  Lily is a cybersecurity and hacking instructor and assistant. She is a Mistral Fine-tune model with 22,000 hand-crafted cybersecurity and hacking-related data pairs. This dataset was then run through an LLM to provide additional context, personality, and styling to the outputs.
23
 
24
  The dataset focuses on general knowledge in most areas of cybersecurity. These included, but are not limited to:
25
+ - Advanced Persistent Threats (APT) Management
26
+ - Architecture and Design
27
+ - Business Continuity and Disaster Recovery
28
+ - Cloud Security
29
+ - Communication and Reporting
30
+ - Cryptography and PKI
31
+ - Data Analysis and Interpretation
32
+ - Digital Forensics
33
+ - GovernanceRiskand Compliance
34
+ - Hacking
35
+ - Identity and Access Management
36
+ - Incident Management and Disaster Recovery Planning
37
+ - Incident Response
38
+ - Information Security Management and Strategy
39
+ - Legal and Ethical Considerations
40
+ - Malware Analysis
41
+ - Networking
42
+ - Penetration Testing and Vulnerability Assessment
43
+ - Physical Security
44
+ - Regulatory Compliance
45
+ - Risk Management
46
+ - Scripting
47
+ - Secure Software Development Lifecycle (SDLC)
48
+ - Security in Emerging Technologies
49
+ - Security Operations and Monitoring
50
+ - Social Engineering and Human Factors
51
+ - Software and Systems Security
52
+ - Technologies and Tools
53
+ - ThreatsAttacksand Vulnerabilities
 
54
 
55
  ## Training
56
 
 
73
 
74
  > Oh, hello there! You know, it's great to dive into the depths of cybersecurity with you. So, you want to know about evil twin wireless attacks? Well, allow me to explain, my geeky friend!
75
  >
76
+ > Evil twin attacks, also known as wireless masquerading, operate just like regular wireless access points (APs). Here's how it works: a nefarious individual sets up a new wireless AP with a signal and name that impersonate a legitimate network. They cleverly utilize the same SSID (Service Set Identifier) as the target network, so it tricks unsuspecting victims into connecting to this malicious AP instead.
77
+ >
78
+ > Once a victim unknowingly connects to the fake AP, the attacker gains access to their network traffic. They can observe, intercept, and even manipulate this data, making it a real headache for those concerned about network security. It's like having someone peeking into your private conversations! Not cool, right?
79
+ >
80
+ > But the attack doesn't end there. The imposter AP can also redirect the traffic directly through the attacker's computer, allowing them to perform other network-based attacks such as phishing, man-in-the-middle, or even DNS spoofing. It's like a whole cyber-playground for the bad guys!
81
  >
82
  > Now, how can we protect ourselves against these sneaky attackers? Well, my cyber-savvy companion, one effective method is the employment of WPA3 encryption. It adds an extra layer of security to wireless networks, making it much harder for attackers to intercept and manipulate our data.
83
  >