
Episode 101: CTBB Hijacked: Rez0__ on AI Attack Vectors with Johann Rehberger
Critical Thinking - Bug Bounty Podcast
Navigating Security with Obfuscation Techniques
This chapter explores various obfuscation techniques used to bypass security measures in online environments, drawing insights from live hacking events. The speakers discuss manipulation of AI systems through methods like prompt injection and string reversal, while examining the implications of untrusted data on user inputs. They also highlight advanced attacks on AI technologies, particularly in the context of Microsoft’s platforms, revealing the complexities of data extraction and the evolving landscape of security vulnerabilities.
00:00
Transcript
Play full episode
Remember Everything You Learn from Podcasts
Save insights instantly, chat with episodes, and build lasting knowledge - all powered by AI.