Christopher Bleckmann-Dreher, MCTTP

Christopher Bleckmann-Dreher

Security Geek, Cyber, Selfhoster, Beer Lover, Pragmatist, @schniggie


Christopher began his career in the early 2000s, managing dedicated servers and providing hosting services. In 2012, he transitioned into full-time penetration testing, analyzing applications and environments for major corporations. Nowadays Principal Offensive Security in the automotive industry, Lecturer at DHBW Stuttgart and freelancing 10+ years. Some research over the last years: 2019 #watchgate (https://troopers.de/troopers19/agenda/yugzay/), 2024 unprotected docker registries (https://dreher.in/blog/unprotected-container-registries)

talks & Q&A

conference | sep 19

Computer Kill Flanders in 2025: "Homer’s Revenge Exploring Offensive AI Use Cases"

Hands-on demonstrations showing the offensive potential of AI.

Description

The rapid evolution of artificial intelligence (AI) and large language models (LLMs) by 2025 has unlocked powerful capabilities for both constructive and disruptive applications. This talk delves into the offensive potential of AI through a humorous, Simpsons-inspired narrative, drawing from the episode "The Computer Wore Menace Shoes," where Homer Simpson attempts to program his computer to "kill" Ned Flanders. Reimagining this scenario with modern AI, we explore how Homer could leverage 2025’s advanced tools to playfully disrupt Flanders’ life, while highlighting real-world security implications.


The presentation covers key offensive AI use cases, including:


  1. Reconnaissance and OSINT: Using AI-driven open-source intelligence to gather actionable data for targeted pranks, such as uncovering personal preferences or online habits.
  2. Web Vulnerability Exploitation: Employing AI-enhanced penetration testing to manipulate smart home systems or e-commerce platforms, demonstrating risks to IoT and web security.
  3. Social Engineering: Harnessing voice cloning and deepfake technologies to impersonate trusted figures, illustrating phishing and fraud vulnerabilities.
  4. Mobile Application Manipulation: Analyzing and modifying Android apps with AI to alter functionality, exposing risks in app security.
  5. Network Interference: Using AI-driven network analysis to disrupt internet traffic, highlighting threats to network integrity.
  6. Automated Attack Orchestration: Deploying AI agents to automate multi-stage attacks, showcasing the scalability of offensive operations.


Each use case is accompanied by hands-on demonstrations in controlled environments, ensuring educational value without real-world harm. Through Homer’s misadventures, the talk underscores the dual-use nature of AI, emphasizing the need for robust cybersecurity defenses. Attendees will gain insights into offensive AI techniques, their ethical boundaries, and strategies to mitigate such threats, all wrapped in a lighthearted Simpsons-themed storyline that makes complex concepts accessible and engaging.


Why the committee chose this talk

We have been very careful not to be overrun by AI security talks and to filter only the real useful ones. AI will change the world. Lets find out how.