Gå offline med appen Player FM !
Episode 101: CTBB Hijacked: Rez0__ on AI Attack Vectors with Johann Rehberger
Manage episode 455119994 series 3435922
Episode 101: In this episode of Critical Thinking - Bug Bounty Podcast we’ve been hijacked! Rez0 takes control of this episode, and sits down with Johann Rehberger to discuss the intricacies of AI application vulnerabilities. They talk through the importance of understanding system prompts, and various obfuscation techniques used to bypass security measures, the best AI platforms, and the evolving landscape of AI security.
Follow us on twitter at: @ctbbpodcast
We're new to this podcasting thing, so feel free to send us any feedback here: info@criticalthinkingpodcast.io
Shoutout to YTCracker for the awesome intro music!
------ Links ------
Follow your hosts Rhynorater & Teknogeek on twitter:
https://twitter.com/0xteknogeek
https://twitter.com/rhynorater
------ Ways to Support CTBBPodcast ------
Hop on the CTBB Discord at https://ctbb.show/discord!
We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.
Today’s Sponsor - ThreatLocker. Check out their Elevation Control! https://www.criticalthinkingpodcast.io/tl-ec
Today’s Guest: https://x.com/wunderwuzzi23
Resources
Johann's blog
https://embracethered.com/blog/
zombais
https://embracethered.com/blog/posts/2024/claude-computer-use-c2-the-zombais-are-coming/
Copirate
Timestamps
(00:00:00) Introduction
(00:01:59) Biggest things to look for in AI hacking
(00:11:58) Best AI companies to hack on
(00:15:59) URL Redirects and Obfuscation Techniques
(00:24:05) Copirate
(00:35:50) prompt injection guardrails and threats
102 episoder
Manage episode 455119994 series 3435922
Episode 101: In this episode of Critical Thinking - Bug Bounty Podcast we’ve been hijacked! Rez0 takes control of this episode, and sits down with Johann Rehberger to discuss the intricacies of AI application vulnerabilities. They talk through the importance of understanding system prompts, and various obfuscation techniques used to bypass security measures, the best AI platforms, and the evolving landscape of AI security.
Follow us on twitter at: @ctbbpodcast
We're new to this podcasting thing, so feel free to send us any feedback here: info@criticalthinkingpodcast.io
Shoutout to YTCracker for the awesome intro music!
------ Links ------
Follow your hosts Rhynorater & Teknogeek on twitter:
https://twitter.com/0xteknogeek
https://twitter.com/rhynorater
------ Ways to Support CTBBPodcast ------
Hop on the CTBB Discord at https://ctbb.show/discord!
We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.
Today’s Sponsor - ThreatLocker. Check out their Elevation Control! https://www.criticalthinkingpodcast.io/tl-ec
Today’s Guest: https://x.com/wunderwuzzi23
Resources
Johann's blog
https://embracethered.com/blog/
zombais
https://embracethered.com/blog/posts/2024/claude-computer-use-c2-the-zombais-are-coming/
Copirate
Timestamps
(00:00:00) Introduction
(00:01:59) Biggest things to look for in AI hacking
(00:11:58) Best AI companies to hack on
(00:15:59) URL Redirects and Obfuscation Techniques
(00:24:05) Copirate
(00:35:50) prompt injection guardrails and threats
102 episoder
Усі епізоди
×Velkommen til Player FM!
Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.