Chuyển sang chế độ ngoại tuyến với ứng dụng Player FM !
Episode 101: CTBB Hijacked: Rez0__ on AI Attack Vectors with Johann Rehberger
Manage episode 455119994 series 3435922
Episode 101: In this episode of Critical Thinking - Bug Bounty Podcast we’ve been hijacked! Rez0 takes control of this episode, and sits down with Johann Rehberger to discuss the intricacies of AI application vulnerabilities. They talk through the importance of understanding system prompts, and various obfuscation techniques used to bypass security measures, the best AI platforms, and the evolving landscape of AI security.
Follow us on twitter at: @ctbbpodcast
We're new to this podcasting thing, so feel free to send us any feedback here: info@criticalthinkingpodcast.io
Shoutout to YTCracker for the awesome intro music!
------ Links ------
Follow your hosts Rhynorater & Teknogeek on twitter:
https://twitter.com/0xteknogeek
https://twitter.com/rhynorater
------ Ways to Support CTBBPodcast ------
Hop on the CTBB Discord at https://ctbb.show/discord!
We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.
Today’s Sponsor - ThreatLocker. Check out their Elevation Control! https://www.criticalthinkingpodcast.io/tl-ec
Today’s Guest: https://x.com/wunderwuzzi23
Resources
Johann's blog
https://embracethered.com/blog/
zombais
https://embracethered.com/blog/posts/2024/claude-computer-use-c2-the-zombais-are-coming/
Copirate
Timestamps
(00:00:00) Introduction
(00:01:59) Biggest things to look for in AI hacking
(00:11:58) Best AI companies to hack on
(00:15:59) URL Redirects and Obfuscation Techniques
(00:24:05) Copirate
(00:35:50) prompt injection guardrails and threats
101 tập
Manage episode 455119994 series 3435922
Episode 101: In this episode of Critical Thinking - Bug Bounty Podcast we’ve been hijacked! Rez0 takes control of this episode, and sits down with Johann Rehberger to discuss the intricacies of AI application vulnerabilities. They talk through the importance of understanding system prompts, and various obfuscation techniques used to bypass security measures, the best AI platforms, and the evolving landscape of AI security.
Follow us on twitter at: @ctbbpodcast
We're new to this podcasting thing, so feel free to send us any feedback here: info@criticalthinkingpodcast.io
Shoutout to YTCracker for the awesome intro music!
------ Links ------
Follow your hosts Rhynorater & Teknogeek on twitter:
https://twitter.com/0xteknogeek
https://twitter.com/rhynorater
------ Ways to Support CTBBPodcast ------
Hop on the CTBB Discord at https://ctbb.show/discord!
We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.
Today’s Sponsor - ThreatLocker. Check out their Elevation Control! https://www.criticalthinkingpodcast.io/tl-ec
Today’s Guest: https://x.com/wunderwuzzi23
Resources
Johann's blog
https://embracethered.com/blog/
zombais
https://embracethered.com/blog/posts/2024/claude-computer-use-c2-the-zombais-are-coming/
Copirate
Timestamps
(00:00:00) Introduction
(00:01:59) Biggest things to look for in AI hacking
(00:11:58) Best AI companies to hack on
(00:15:59) URL Redirects and Obfuscation Techniques
(00:24:05) Copirate
(00:35:50) prompt injection guardrails and threats
101 tập
Tất cả các tập
×Chào mừng bạn đến với Player FM!
Player FM đang quét trang web để tìm các podcast chất lượng cao cho bạn thưởng thức ngay bây giờ. Đây là ứng dụng podcast tốt nhất và hoạt động trên Android, iPhone và web. Đăng ký để đồng bộ các theo dõi trên tất cả thiết bị.