24min chapter

Critical Thinking - Bug Bounty Podcast cover image

Episode 101: CTBB Hijacked: Rez0__ on AI Attack Vectors with Johann Rehberger

Critical Thinking - Bug Bounty Podcast

CHAPTER

Navigating Security with Obfuscation Techniques

This chapter explores various obfuscation techniques used to bypass security measures in online environments, drawing insights from live hacking events. The speakers discuss manipulation of AI systems through methods like prompt injection and string reversal, while examining the implications of untrusted data on user inputs. They also highlight advanced attacks on AI technologies, particularly in the context of Microsoft’s platforms, revealing the complexities of data extraction and the evolving landscape of security vulnerabilities.

00:00

Get the Snipd
podcast app

Unlock the knowledge in podcasts with the podcast player of the future.
App store bannerPlay store banner

AI-powered
podcast player

Listen to all your favourite podcasts with AI-powered features

Discover
highlights

Listen to the best highlights from the podcasts you love and dive into the full episode

Save any
moment

Hear something you like? Tap your headphones to save it with AI-generated key takeaways

Share
& Export

Send highlights to Twitter, WhatsApp or export them to Notion, Readwise & more

AI-powered
podcast player

Listen to all your favourite podcasts with AI-powered features

Discover
highlights

Listen to the best highlights from the podcasts you love and dive into the full episode