- 31
- 176 246
Seven Seas Security
United States
เข้าร่วมเมื่อ 30 เม.ย. 2021
This is the TH-cam channel accompanying my Twitch over at twitch.tv/garr_7. I'm just your average Pentester of all the things. Hoping to share some of the knowledge gained, as well as some tips for those looking to get into the industry.
Hope you enjoy the content!
Hope you enjoy the content!
Indirect Prompt Injection | How Hackers Hijack AI
Part 2 - What is Indirect Prompt Injection or Cross-Prompt Injection Attack XPIA?
This is when an attacker has the ability to inject malicious instructions into an external source that is eventually fetched and retrieved into a Large Language Model. In this video, we're covering what it is, finding it in two different example applications, covering a high-level methodology for discovery, and talking about @embracethered Microsoft Copilot discovery!
Much more to come! We'll soon cover more in-depth prompt engineering methodology as well as RAG systems that use other data sources like files, cloud storage, and more secure database implementations to see what else is possible!
▹ Watch me Live on Twitch - twitch.tv/garr_7
▹ My Discord has more up to date resources for AI - discord.gg/ZqRTzeAdtW
#promptengineering #promptinjection #indirectpromptinjection #ollama #llm #ai #openai #chatgpt #aisecurity #pentesting
▹ Additional References for Further Exploration:
▹ LearnPrompting's Prompt Injection VS Jailbreaking: What is the difference? - learnprompting.org/blog/2024/2/4/injection_jailbreaking
▹ LiveOverflow's Prompt Injection Vid - th-cam.com/video/Sv5OLj2nVAQ/w-d-xo.html
▹ 3Blue1Brown's GOATED Deep Learning Playlist - th-cam.com/video/aircAruvnKk/w-d-xo.html
▹ Wunderwuzzi's Sweet Microsoft Indirect Prompt Injection Writeup by Embrace The Red - embracethered.com/blog/posts/2024/m365-copilot-prompt-injection-tool-invocation-and-data-exfil-using-ascii-smuggling/
▹ Wunderwuzzi's PoC Video - th-cam.com/video/A-ibygtWeYc/w-d-xo.html
▹ Simon Willison - Prompt injection and jailbreaking are not the same thing - simonwillison.net/2024/Mar/5/prompt-injection-jailbreaking/
▹ 3Blue1Brown Chapter 5, Deep Learning - th-cam.com/video/wjZofJX0v4M/w-d-xo.html
▹ Fabric by Daniel Miessler (The Example System Prompt, but really a goated resource for overall workflow augmentation!) - github.com/danielmiessler/fabric
▹ 🔬🧪Labs Used in the Video!🧪🔬
▹ WithSecure Labs Recruitment - github.com/WithSecureLabs/llm-vulnerable-recruitment-app/tree/main
▹ Web Security Academy - Indirect Prompt Injection - portswigger.net/web-security/llm-attacks/lab-indirect-prompt-injection
------------------------------------------------------------------------------
In this series, we take a look at different application architecture that involves Generative AI. Starting simply with this video, we cover the concept of Indirect Prompt Injection at a high level! The goal is to break down the concepts to not only hack, but talk about methodology and the mental steps we take in order to discover these vulnerabilities in the wild.
Timestamps:
0:00 Why AI all of a sudden?
0:30 Need background? Check LiveOverflow & 3Blue1Brown
0:48 Indirect Prompt Injection vs. Prompt Injection
2:07 Some Impacts of Indirect Prompt Injection
3:30 Wunderwuzzi's REAL WORLD Indirect Prompt Injection to Data Exfiltration
4:33 Intro to Lab 1 - WithSecure Labs Recruitment Portal
5:16 Increased Complexity Increases Risk
5:38 Lab 1 START
8:08 What about XSS?
10:25 High-Level Methodology Discussion
14:55 Example Architecture Review for XPIA
17:50 Web Sec Academy - Black Box Methodology!
20:08 I was actually SHOCKED. I guess we did it?
22:20 Prompt Engineering Video and Realistic RAG Video soon!
This is when an attacker has the ability to inject malicious instructions into an external source that is eventually fetched and retrieved into a Large Language Model. In this video, we're covering what it is, finding it in two different example applications, covering a high-level methodology for discovery, and talking about @embracethered Microsoft Copilot discovery!
Much more to come! We'll soon cover more in-depth prompt engineering methodology as well as RAG systems that use other data sources like files, cloud storage, and more secure database implementations to see what else is possible!
▹ Watch me Live on Twitch - twitch.tv/garr_7
▹ My Discord has more up to date resources for AI - discord.gg/ZqRTzeAdtW
#promptengineering #promptinjection #indirectpromptinjection #ollama #llm #ai #openai #chatgpt #aisecurity #pentesting
▹ Additional References for Further Exploration:
▹ LearnPrompting's Prompt Injection VS Jailbreaking: What is the difference? - learnprompting.org/blog/2024/2/4/injection_jailbreaking
▹ LiveOverflow's Prompt Injection Vid - th-cam.com/video/Sv5OLj2nVAQ/w-d-xo.html
▹ 3Blue1Brown's GOATED Deep Learning Playlist - th-cam.com/video/aircAruvnKk/w-d-xo.html
▹ Wunderwuzzi's Sweet Microsoft Indirect Prompt Injection Writeup by Embrace The Red - embracethered.com/blog/posts/2024/m365-copilot-prompt-injection-tool-invocation-and-data-exfil-using-ascii-smuggling/
▹ Wunderwuzzi's PoC Video - th-cam.com/video/A-ibygtWeYc/w-d-xo.html
▹ Simon Willison - Prompt injection and jailbreaking are not the same thing - simonwillison.net/2024/Mar/5/prompt-injection-jailbreaking/
▹ 3Blue1Brown Chapter 5, Deep Learning - th-cam.com/video/wjZofJX0v4M/w-d-xo.html
▹ Fabric by Daniel Miessler (The Example System Prompt, but really a goated resource for overall workflow augmentation!) - github.com/danielmiessler/fabric
▹ 🔬🧪Labs Used in the Video!🧪🔬
▹ WithSecure Labs Recruitment - github.com/WithSecureLabs/llm-vulnerable-recruitment-app/tree/main
▹ Web Security Academy - Indirect Prompt Injection - portswigger.net/web-security/llm-attacks/lab-indirect-prompt-injection
------------------------------------------------------------------------------
In this series, we take a look at different application architecture that involves Generative AI. Starting simply with this video, we cover the concept of Indirect Prompt Injection at a high level! The goal is to break down the concepts to not only hack, but talk about methodology and the mental steps we take in order to discover these vulnerabilities in the wild.
Timestamps:
0:00 Why AI all of a sudden?
0:30 Need background? Check LiveOverflow & 3Blue1Brown
0:48 Indirect Prompt Injection vs. Prompt Injection
2:07 Some Impacts of Indirect Prompt Injection
3:30 Wunderwuzzi's REAL WORLD Indirect Prompt Injection to Data Exfiltration
4:33 Intro to Lab 1 - WithSecure Labs Recruitment Portal
5:16 Increased Complexity Increases Risk
5:38 Lab 1 START
8:08 What about XSS?
10:25 High-Level Methodology Discussion
14:55 Example Architecture Review for XPIA
17:50 Web Sec Academy - Black Box Methodology!
20:08 I was actually SHOCKED. I guess we did it?
22:20 Prompt Engineering Video and Realistic RAG Video soon!
มุมมอง: 2 009
วีดีโอ
Beginner's Guide to GenAI Application Hacking | Simple RAG Setup Means Simple Wins
มุมมอง 3.3K3 หลายเดือนก่อน
Part 1 - Hacking a Simple RAG Implementation from Medium! Retrieval Augmented Generation (RAG) systems include a retrieval mechanism into the workflow. This, of course, introduces the potential for vulnerabilities! In this first part, we're covering a super simple implementation we found on Medium. Much more to come! We'll soon cover RAG systems that use other data sources like files, cloud sto...
Understanding JWTs Helped Find IRL Bugs | JWT Hacking Part 1
มุมมอง 4179 หลายเดือนก่อน
Hacking JWTs! Portswigger Web Security Academy JWT authentication bypass via unverified signature - portswigger.net/web-security/jwt/lab-jwt-authentication-bypass-via-unverified-signature ▹ SKIP TO LAB - 5:12 ▹ Watch me Live on Twitch - twitch.tv/garr_7 ▹ Shoutout to Shikairi for the Editing! - _shikairi #JWThacking #hacker #bugbounty #website ▹ Additional References for Further Exp...
HTTP Host Header Attacks Lab Breakdown: Host header authentication bypass
มุมมอง 1.5K2 ปีที่แล้ว
▹ Watch me Live on Twitch every Monday and Thursday! - twitch.tv/garr_7 Portswigger Web Security Academy HTTP Host Header Attacks Lab: Host header authentication bypass - portswigger.net/web-security/host-header/exploiting/lab-host-header-authentication-bypass Additional References for Further Exploration: Garr's Walkthrough of HTTP Host Header Attacks Lab: Basic password reset poisoning - th-c...
HTTP Host Header Attacks Lab Breakdown: Basic password reset poisoning
มุมมอง 4K2 ปีที่แล้ว
▹ Watch me Live on Twitch every Monday and Thursday! - twitch.tv/garr_7 Portswigger Web Security Academy HTTP Host Header Attacks Lab: Basic password reset poisoning - portswigger.net/web-security/host-header/exploiting/password-reset-poisoning/lab-host-header-basic-password-reset-poisoning Additional References for Further Exploration: PortSwigger's Host Header Attacks Resource - portswigger.n...
Cross-Site Scripting Lab Breakdown: Stored XSS into HTML context with nothing encoded
มุมมอง 9902 ปีที่แล้ว
▹ Watch me Live on Twitch every Monday and Thursday! - twitch.tv/garr_7 Portswigger Web Security Academy Cross-Site Scripting (XSS) Lab: Stored XSS into HTML context with nothing encoded - portswigger.net/web-security/cross-site-scripting/stored/lab-html-context-nothing-encoded Additional References for Further Exploration: Reflected XSS into HTML context with nothing encoded - th-cam.com/video...
Cross-Site Scripting Lab Breakdown: Reflected XSS into HTML context with nothing encoded
มุมมอง 1.1K2 ปีที่แล้ว
▹ Watch me Live on Twitch every Monday and Thursday! - twitch.tv/garr_7 ▹ Twitter: garrghar Portswigger Web Security Academy Cross-Site Scripting (XSS) Lab: Reflected XSS into HTML context with nothing encoded - portswigger.net/web-security/cross-site-scripting/reflected/lab-html-context-nothing-encoded Additional References for Further Exploration: Awesome In-Depth XSS Breakdown by...
SSTI Complete Lab Breakdown: Server-side template injection with a custom exploit
มุมมอง 6K2 ปีที่แล้ว
▹ Watch me Live on Twitch every Monday and Thursday! - twitch.tv/garr_7 Portswigger Web Security Academy Server-Side Template Injection (SSTI) Lab: Server-side template injection with a custom exploit - portswigger.net/web-security/server-side-template-injection/exploiting/lab-server-side-template-injection-with-a-custom-exploit Additional References for Further Exploration: Solving this Live o...
SSTI Complete Lab Breakdown: Server-side template injection in a sandboxed environment
มุมมอง 4.5K2 ปีที่แล้ว
▹ Watch me Live on Twitch every Monday and Thursday! - twitch.tv/garr_7 Portswigger Web Security Academy Server-Side Template Injection (SSTI) Lab: Server-side template injection in a sandboxed environment - portswigger.net/web-security/server-side-template-injection/exploiting/lab-server-side-template-injection-in-a-sandboxed-environment Additional References for Further Exploration: My SSTI E...
SSTI Complete Lab Breakdown: SSTI w/ info disclosure via user-supplied objects
มุมมอง 4.3K2 ปีที่แล้ว
SSTI Complete Lab Breakdown: SSTI w/ info disclosure via user-supplied objects
SSTI Complete Lab Breakdown: Server-side template injection - unknown language - documented exploit
มุมมอง 5K2 ปีที่แล้ว
SSTI Complete Lab Breakdown: Server-side template injection - unknown language - documented exploit
SSTI Complete Lab Breakdown: Server-side template injection using documentation
มุมมอง 6K2 ปีที่แล้ว
SSTI Complete Lab Breakdown: Server-side template injection using documentation
SSTI Complete Lab Breakdown: Basic server-side template injection (code context)
มุมมอง 9K2 ปีที่แล้ว
SSTI Complete Lab Breakdown: Basic server-side template injection (code context)
SSTI Complete Lab Breakdown: Basic server-side template injection
มุมมอง 17K2 ปีที่แล้ว
SSTI Complete Lab Breakdown: Basic server-side template injection
XXE Lab Breakdown: Blind XXE with out-of-band interaction via XML parameter entities
มุมมอง 5K2 ปีที่แล้ว
XXE Lab Breakdown: Blind XXE with out-of-band interaction via XML parameter entities
XXE Lab Breakdown: Exploiting blind XXE to exfiltrate data using a malicious external DTD
มุมมอง 10K2 ปีที่แล้ว
XXE Lab Breakdown: Exploiting blind XXE to exfiltrate data using a malicious external DTD
XXE Lab Breakdown: Exploiting XInclude to retrieve files
มุมมอง 7K2 ปีที่แล้ว
XXE Lab Breakdown: Exploiting XInclude to retrieve files
XXE Lab Breakdown: Exploiting blind XXE to retrieve data via error messages
มุมมอง 5K2 ปีที่แล้ว
XXE Lab Breakdown: Exploiting blind XXE to retrieve data via error messages
XXE Lab Breakdown: Exploiting XXE to retrieve data by repurposing a local DTD
มุมมอง 3.9K2 ปีที่แล้ว
XXE Lab Breakdown: Exploiting XXE to retrieve data by repurposing a local DTD
XXE Lab Breakdown: Exploiting XXE to perform SSRF attacks
มุมมอง 12K2 ปีที่แล้ว
XXE Lab Breakdown: Exploiting XXE to perform SSRF attacks
XXE Lab Breakdown: Blind XXE with out-of-band interaction
มุมมอง 8K2 ปีที่แล้ว
XXE Lab Breakdown: Blind XXE with out-of-band interaction
XXE Lab Breakdown: Exploiting XXE using external entities to retrieve files
มุมมอง 18K2 ปีที่แล้ว
XXE Lab Breakdown: Exploiting XXE using external entities to retrieve files
XXE Lab Breakdown: Exploiting XXE via image file upload
มุมมอง 9K2 ปีที่แล้ว
XXE Lab Breakdown: Exploiting XXE via image file upload
Learning XXE with PortSwigger's Web Security Academy - Part 2
มุมมอง 8862 ปีที่แล้ว
Learning XXE with PortSwigger's Web Security Academy - Part 2
Learning XXE with PortSwigger's Web Security Academy - Part 1
มุมมอง 1.9K2 ปีที่แล้ว
Learning XXE with PortSwigger's Web Security Academy - Part 1
If possible you can make a series of each lap completely
Thanks dear , i really appreciate and you are only the one who i understand from never stop and keep going through
Best explanation ever heard .Thanks Pale
Somebody have any idea why there is a Submit feedpack endpoint in this lab ?
Full video please?
I thought we were weighting system prompts more than user prompts. Aren't we?
Bit too much on the EQ brotha. Good video tho.
dude you make such good videos
Really appreciate the kind words! We put a lot of work in these videos, so that’s definitely much appreciated.
@@7SeasSecurity oh for sure dude! And ohhh yea I bet! I've seriously considered making videos or blog content and will again but it's so much work. Been busy learning lol
💙💙💙
Am I the only one that's got the audio and video not completely synced? super trippy
Maybe I'm having a stroke? lol
Its AI
With the rise of AI you'll pretty much have to do this as an applicant.
Have you heard of a prompt injection entering a Facebook backdoor database? Iteration internal promps loops.
Thanks for covering the black box perspective! Awesome video!
Always glad to tackle the black box side of the house! Appreciate the kind words and you as always!
The ratio of brain rot to hacking is perfect in this video. good job!
It’s a tough balance!
I will take your advice and not marry these ideas
I love it! Thanks for watching and appreciate your time!
Do more on code review please
Definitely will do! Like I mentioned in the video, the overall prompt injection / engineering video will definitely involve code review! Thanks for checking out the video!
👀
👀
First
Yeah you were!
He is in a sandbox, now scape from there. 😉
(4:16) While I'm sure that was just for demonstration purposes, that image illustrating the "Neil Armstrong" and "Charles Lindbergh" mixup is a total fabrication. A hallucination is when a word with double meaning triggers a crossover in the LLM. Charles Lindbergh has zero connection to the Lunar Pioneer mission. The better example would be if "Michael Jackson" (who invented the "moonwalk") somehow ended up as the first person to "walk" the "moon". Also, there's never multiple hallucinations in the same prompt (1951 AND Lindbergh AND Pioneer). And it's not "broadcasted". That's not a word. It's "broadcast" (it was "cast broadly"). There's a 0% chance that an LLM output the word "broadcasted".
Ask an AI to hack into an AI
Yup 100%! Tools like PyRIT and garak are perfect for that
Here for the Portal V sound
Thank you for the video. I like your explanations. Please make more
first
When the AI apocalypse happens, Garr_7 is gonna be the safest man on Earth
One can only hope.
joined the twitch and tried to leave my adhd at the door, i swear... ;) well worth the effort to catch live.
Always appreciate you, HEXiT! Thanks for stopping by!
I've been waiting more contents from you like years. Please upload more I beg. You explain things so well and clearly.
Really appreciate the kind words! It's been a roller coaster lately, but we'll work to try and keep uploading more consistently!
After Long time a Video in TH-cam :) except Live Stream :)
First time viewer, loved the content mate ! Curious to see you prompt inject a RAG model with knowledge stored as files (instead of SQL).
Really appreciate that! I've been diving super heavy in hacking apps leveraging GenAI, so glad to hear it's been enjoyable! I'll most likely break this down into a more digestible, direct video when I have the bandwidth to record / edit. Re: file-based RAG - That's definitely an interesting scenario and definitely happy to tackle that! Probably will start with local files, then expand the attack surface by including file shares, cloud storage, etc. Appreciate the recommendation and getting the wheels turning!
Hi, many thanks!
may i access the lab ftp ??? i want to practic that chall
The best explanation on PortSwigger XXE OOB out there.
Thanks for the video it is very helpful ! However, I still did not get why do you use a stack entity and why you do not directly use the exfil entity ?
Where can I get vulnerable code ?
thanks for sharing this man, I never could understand how this works without watching this
excellent quality I love so much you video man
I actually did this with a tuya iot camera and got a uboot shell by removing a 'silent' argument in the binary and flashing it on and i also set bootdelay to 3 in the binary and replaced the password hash with my own
Great work, thanks👏
great explanation!, you should make more portswigger videos🙌
great video!
Really appreciate that!
You're one of my fav web app hacker. I cannot wait for the other videos.
Really appreciate that! Definitely more videos to come!
*promosm* 😄
Which terminal to read uart?
Good question! I use screen personally, but I’ve heard great things about Minicom. Minicom lets you change baud rate on the fly, which is nice. I just use screen out of habit, but there are lots of options!
Best resource, among all i have to check. Good Keep going
Really appreciate that!
Thank you for taking the time to do this, to edit the videos and for sharing!
Definitely glad to share the knowledge and lessons learned!
Another amazing video!
Thank you!
Finally your back 😁 and what a coincidence I was learning about JWTs only
Glad to be back!
Great Video! You're an awesome teacher! Keep pushing out videos!
Really appreciate the kind words! We'll work on trying to get more videos out!
Garr the literal wizard 🧙🔥🔥🔥
Long time no see, y'all! This video was recorded way back in 2022 and it covers the first Web Security Academy Lab. I added a bit of updates, but it should be a good "primer" for understanding JWTs and the "why" behind hacking them! We'll be covering the rest of the labs soon for a more in-depth, comprehensive methodology around JWTs, but we hope you enjoy this initial video!