Week 7: Prompt Engineering, OSI model and a Pinch of Python


What was this week about?
This week was much calmer compared to the rest, in terms of challenges, as it focused mainly on reviewing the basics of Python and learning a few other things. It was a week of great progress, and as I transition into the second phase of this project, I'll start building simple scripts for ethical hacking, like a MAC changer. I'll follow along with my instructor on Udemy and hope to see a functioning tool in a year or so.
This week’s goals:
Start python section of my Udemy course.
Install Anaconda for coding.
What I learned this week:
Prompt Engineering
Black-hat hackers use prompt engineering to manipulate large language models (LLMs) through a process known as “jail breaking”, which can help them perform unethical activities. The manipulated LLMs can then be used to generate ransomware, malware, and other harmful software. I've been practicing the basics of prompt engineering on Gandalf, an online platform that serves as an educational tool for novice hackers. Here's a screenshot of me tackling Gandalf's level 7, where I'm trying to use German prompts. The hypothesis is that these models are less trained in that language than in English, making them more vulnerable to manipulation.
Network Theory
I learned more about the theoretical concepts behind real-world networks. For example, the OSI model, also known as the Open Systems Interconnection reference model, is used to understand how computer networks are structured. This conceptual model has seven layers, an image of which is shown below.
Python
I installed Anaconda and familiarized myself with Jupyter Notebook, a commonly used IDE for coding in Python. Reviewing the basics of Python will solidify my foundation for programming the ethical hacking scripts I'll begin writing soon.
Challenges I faced
I couldn't open my KALI virtual machine due to memory storage issues.
How I solved the problems
For the past few days, I had been thinking about installing the KALI virtual machine from the official website. Previously, I had been using a custom KALI image from a private platform that had several tools uninstalled. Sparked by the memory storage issue, I decided to delete the custom image and install the official version of the KALI virtual machine.
Next week’s goals:
Start writing custom scripts for ethical hacking
Try and complete the course
Finishing Up:
This week was a solid step forward, solidifying my foundational knowledge before I dive into more complex topics. With my goals for next week in sight, I feel well-prepared to begin building and testing my own tools. Thanks for following along!
As Elon Musk once said, "I could either watch it happen or be a part of it."
Disclaimer:
This blog documents my personal journey in learning ethical hacking and cybersecurity with the intent to build responsible AI tools for penetration testing and system defense.
All experiments are conducted in isolated lab environments on virtual machines I own or control. This project is strictly for educational and ethical purposes.
I do not condone or promote any form of unauthorized or illegal access to systems.
Subscribe to my newsletter
Read articles from Aditya Soni directly inside your inbox. Subscribe to the newsletter, and don't miss out.
Written by
