I thought we were weighting system prompts more than user prompts. Aren't we?
@fellzerАй бұрын
Bit too much on the EQ brotha. Good video tho.
@comosaycomosahАй бұрын
dude you make such good videos
@7SeasSecurityАй бұрын
Really appreciate the kind words! We put a lot of work in these videos, so that’s definitely much appreciated.
@comosaycomosahАй бұрын
@@7SeasSecurity oh for sure dude! And ohhh yea I bet! I've seriously considered making videos or blog content and will again but it's so much work. Been busy learning lol
@KiDR_IANIАй бұрын
💙💙💙
@Terry-f6fАй бұрын
Am I the only one that's got the audio and video not completely synced? super trippy
@Terry-f6fАй бұрын
Maybe I'm having a stroke? lol
@Red.Dots.Ай бұрын
Its AI
@salzkastenАй бұрын
With the rise of AI you'll pretty much have to do this as an applicant.
@superflipingАй бұрын
Have you heard of a prompt injection entering a Facebook backdoor database? Iteration internal promps loops.
@chrisalupuluiАй бұрын
Thanks for covering the black box perspective! Awesome video!
@7SeasSecurityАй бұрын
Always glad to tackle the black box side of the house! Appreciate the kind words and you as always!
@SensuBeemАй бұрын
The ratio of brain rot to hacking is perfect in this video. good job!
@7SeasSecurityАй бұрын
It’s a tough balance!
@adyp487Ай бұрын
I will take your advice and not marry these ideas
@7SeasSecurityАй бұрын
I love it! Thanks for watching and appreciate your time!
@ThetHtooZaw-pv3wlАй бұрын
Do more on code review please
@7SeasSecurityАй бұрын
Definitely will do! Like I mentioned in the video, the overall prompt injection / engineering video will definitely involve code review! Thanks for checking out the video!
@adyp487Ай бұрын
👀
@7SeasSecurityАй бұрын
👀
@ProblemsunАй бұрын
First
@7SeasSecurityАй бұрын
Yeah you were!
@Coffee-and-PizzaАй бұрын
He is in a sandbox, now scape from there. 😉
@dirtydevoteeАй бұрын
(4:16) While I'm sure that was just for demonstration purposes, that image illustrating the "Neil Armstrong" and "Charles Lindbergh" mixup is a total fabrication. A hallucination is when a word with double meaning triggers a crossover in the LLM. Charles Lindbergh has zero connection to the Lunar Pioneer mission. The better example would be if "Michael Jackson" (who invented the "moonwalk") somehow ended up as the first person to "walk" the "moon". Also, there's never multiple hallucinations in the same prompt (1951 AND Lindbergh AND Pioneer). And it's not "broadcasted". That's not a word. It's "broadcast" (it was "cast broadly"). There's a 0% chance that an LLM output the word "broadcasted".
@MackinsonTheGreatАй бұрын
Ask an AI to hack into an AI
@7SeasSecurityАй бұрын
Yup 100%! Tools like PyRIT and garak are perfect for that
@BloxFruitBanditsАй бұрын
Here for the Portal V sound
@ProblemsunАй бұрын
Thank you for the video. I like your explanations. Please make more
@ProblemsunАй бұрын
first
@pebble1Ай бұрын
When the AI apocalypse happens, Garr_7 is gonna be the safest man on Earth
@7SeasSecurityАй бұрын
One can only hope.
@HEXiT_Ай бұрын
joined the twitch and tried to leave my adhd at the door, i swear... ;) well worth the effort to catch live.
@7SeasSecurityАй бұрын
Always appreciate you, HEXiT! Thanks for stopping by!
@ThetHtooZaw-pv3wlАй бұрын
I've been waiting more contents from you like years. Please upload more I beg. You explain things so well and clearly.
@7SeasSecurityАй бұрын
Really appreciate the kind words! It's been a roller coaster lately, but we'll work to try and keep uploading more consistently!
@Dayanandhansubramani-rj6tcАй бұрын
After Long time a Video in KZbin :) except Live Stream :)
@jazzyonline87932 ай бұрын
First time viewer, loved the content mate ! Curious to see you prompt inject a RAG model with knowledge stored as files (instead of SQL).
@7SeasSecurity2 ай бұрын
Really appreciate that! I've been diving super heavy in hacking apps leveraging GenAI, so glad to hear it's been enjoyable! I'll most likely break this down into a more digestible, direct video when I have the bandwidth to record / edit. Re: file-based RAG - That's definitely an interesting scenario and definitely happy to tackle that! Probably will start with local files, then expand the attack surface by including file shares, cloud storage, etc. Appreciate the recommendation and getting the wheels turning!
@minhld87362 ай бұрын
Hi, many thanks!
@thinhdang92562 ай бұрын
may i access the lab ftp ??? i want to practic that chall
@cowid3 ай бұрын
The best explanation on PortSwigger XXE OOB out there.
@manondu443 ай бұрын
Thanks for the video it is very helpful ! However, I still did not get why do you use a stack entity and why you do not directly use the exfil entity ?
@techvertos41653 ай бұрын
Where can I get vulnerable code ?
@j4ck_d4niels4 ай бұрын
thanks for sharing this man, I never could understand how this works without watching this
@Carlos-kc8vx4 ай бұрын
excellent quality I love so much you video man
@309electronics55 ай бұрын
I actually did this with a tuya iot camera and got a uboot shell by removing a 'silent' argument in the binary and flashing it on and i also set bootdelay to 3 in the binary and replaced the password hash with my own
@aliel-shennawy36705 ай бұрын
Great work, thanks👏
@z1ro_zb5 ай бұрын
great explanation!, you should make more portswigger videos🙌
@z1ro_zb5 ай бұрын
great video!
@7SeasSecurity5 ай бұрын
Really appreciate that!
@efran.calikoglu6 ай бұрын
You're one of my fav web app hacker. I cannot wait for the other videos.
@7SeasSecurity5 ай бұрын
Really appreciate that! Definitely more videos to come!
@alicia21116 ай бұрын
*promosm* 😄
@vupham57456 ай бұрын
Which terminal to read uart?
@7SeasSecurity6 ай бұрын
Good question! I use screen personally, but I’ve heard great things about Minicom. Minicom lets you change baud rate on the fly, which is nice. I just use screen out of habit, but there are lots of options!
@suder54ULs6 ай бұрын
Best resource, among all i have to check. Good Keep going
@7SeasSecurity5 ай бұрын
Really appreciate that!
@droidh4x0r67 ай бұрын
Thank you for taking the time to do this, to edit the videos and for sharing!
@7SeasSecurity5 ай бұрын
Definitely glad to share the knowledge and lessons learned!
@thewifiaddict7 ай бұрын
Another amazing video!
@7SeasSecurity7 ай бұрын
Thank you!
@nishantdalvi94707 ай бұрын
Finally your back 😁 and what a coincidence I was learning about JWTs only
@7SeasSecurity7 ай бұрын
Glad to be back!
@armandoflores47837 ай бұрын
Great Video! You're an awesome teacher! Keep pushing out videos!
@7SeasSecurity7 ай бұрын
Really appreciate the kind words! We'll work on trying to get more videos out!
@MSecYT7 ай бұрын
Garr the literal wizard 🧙🔥🔥🔥
@7SeasSecurity7 ай бұрын
Long time no see, y'all! This video was recorded way back in 2022 and it covers the first Web Security Academy Lab. I added a bit of updates, but it should be a good "primer" for understanding JWTs and the "why" behind hacking them! We'll be covering the rest of the labs soon for a more in-depth, comprehensive methodology around JWTs, but we hope you enjoy this initial video!
@TwistedXD97 ай бұрын
Please make more videos
@TwistedXD97 ай бұрын
you do hardware too?
@7SeasSecurity5 ай бұрын
Yep! Been fun getting back into it!
@TwistedXD97 ай бұрын
can you make more youtube videos on portswigger labs?