Indirect Prompt Injection

  Рет қаралды 1,628

Intigriti

Intigriti

Күн бұрын

Пікірлер: 5
@sharmaskeleton
@sharmaskeleton Ай бұрын
I am bowing my head in front of your cyber security knowledge. Lots of love from India 🇮🇳
@intigriti
@intigriti Ай бұрын
Awww 🥰 I love India! 💜
@HemanthJavvaji-g3g
@HemanthJavvaji-g3g Ай бұрын
The payload you put in actually worked because the actual sequence required to escape is `}]}`. You just accidentally changed the sequence from `}]}` to `]}}` at 7:37. That's the reason why `]}}` didn't work but your final payload `}]}}` used to escape worked in this case. Because the first three chars match up which are enough to escape in this case
@intigriti
@intigriti Ай бұрын
Damn OK.. That does not surprise me 😆 I thought I similar issues prior to recording but could have just been more typos 😂
@e1Pr0f3ss0r
@e1Pr0f3ss0r Ай бұрын
Can u share the link to access the lab
Exploiting Insecure Output Handling in LLMs
12:58
Intigriti
Рет қаралды 716
Exploiting Server-side Parameter Pollution in a REST URL
10:37
Intigriti
Рет қаралды 2,3 М.
🩷🩵VS👿
00:38
ISSEI / いっせい
Рет қаралды 25 МЛН
Magic trick 🪄😁
00:13
Andrey Grechka
Рет қаралды 52 МЛН
Кадр сыртындағы қызықтар | Келінжан
00:16
What Is a Prompt Injection Attack?
10:57
IBM Technology
Рет қаралды 195 М.
Common Scoping Mistakes
24:30
Intigriti
Рет қаралды 792
Indirect prompt injection - Lab#03
16:45
Mohd Badrudduja
Рет қаралды 35
The World Depends on 60-Year-Old Code No One Knows Anymore
9:30
Coding with Dee
Рет қаралды 755 М.
Exploiting Server-side Parameter Pollution in a Query String
11:26
Attacking LLM - Prompt Injection
13:23
LiveOverflow
Рет қаралды 370 М.
Introduction to GraphQL Attacks
18:50
Intigriti
Рет қаралды 1,7 М.
microsoft doubles down on recording your screen
10:00
Low Level Learning
Рет қаралды 57 М.
My Favorite API Hacking Vulnerabilities & Tips
10:08
NahamSec
Рет қаралды 10 М.
🩷🩵VS👿
00:38
ISSEI / いっせい
Рет қаралды 25 МЛН