No video

Indirect Prompt Injection

  Рет қаралды 1,628

Intigriti

Intigriti

Күн бұрын

Пікірлер: 5
@sharmaskeleton
@sharmaskeleton Ай бұрын
I am bowing my head in front of your cyber security knowledge. Lots of love from India 🇮🇳
@intigriti
@intigriti Ай бұрын
Awww 🥰 I love India! 💜
@HemanthJavvaji-g3g
@HemanthJavvaji-g3g Ай бұрын
The payload you put in actually worked because the actual sequence required to escape is `}]}`. You just accidentally changed the sequence from `}]}` to `]}}` at 7:37. That's the reason why `]}}` didn't work but your final payload `}]}}` used to escape worked in this case. Because the first three chars match up which are enough to escape in this case
@intigriti
@intigriti Ай бұрын
Damn OK.. That does not surprise me 😆 I thought I similar issues prior to recording but could have just been more typos 😂
@e1Pr0f3ss0r
@e1Pr0f3ss0r Ай бұрын
Can u share the link to access the lab
Exploiting Insecure Output Handling in LLMs
12:58
Intigriti
Рет қаралды 716
Exploiting Server-side Parameter Pollution in a REST URL
10:37
Intigriti
Рет қаралды 2,3 М.
Matching Picture Challenge with Alfredo Larin's family! 👍
00:37
BigSchool
Рет қаралды 36 МЛН
If Barbie came to life! 💝
00:37
Meow-some! Reacts
Рет қаралды 75 МЛН
This Dumbbell Is Impossible To Lift!
01:00
Stokes Twins
Рет қаралды 32 МЛН
Ik Heb Aardbeien Gemaakt Van Kip🍓🐔😋
00:41
Cool Tool SHORTS Netherlands
Рет қаралды 9 МЛН
What Is a Prompt Injection Attack?
10:57
IBM Technology
Рет қаралды 195 М.
Introduction to GraphQL Attacks
18:50
Intigriti
Рет қаралды 1,7 М.
Learn Nuclei in 30 minutes - DEF CON Nuclei Demo
35:48
ProjectDiscovery
Рет қаралды 10 М.
Attacking LLM - Prompt Injection
13:23
LiveOverflow
Рет қаралды 370 М.
The World Depends on 60-Year-Old Code No One Knows Anymore
9:30
Coding with Dee
Рет қаралды 755 М.
Exploiting Server-side Parameter Pollution in a Query String
11:26
Matching Picture Challenge with Alfredo Larin's family! 👍
00:37
BigSchool
Рет қаралды 36 МЛН