Seven Seas Security
Seven Seas Security
  • 31
  • 176 246
Indirect Prompt Injection | How Hackers Hijack AI
Part 2 - What is Indirect Prompt Injection or Cross-Prompt Injection Attack XPIA?
This is when an attacker has the ability to inject malicious instructions into an external source that is eventually fetched and retrieved into a Large Language Model. In this video, we're covering what it is, finding it in two different example applications, covering a high-level methodology for discovery, and talking about @embracethered Microsoft Copilot discovery!
Much more to come! We'll soon cover more in-depth prompt engineering methodology as well as RAG systems that use other data sources like files, cloud storage, and more secure database implementations to see what else is possible!
▹ Watch me Live on Twitch - twitch.tv/garr_7
▹ My Discord has more up to date resources for AI - discord.gg/ZqRTzeAdtW
#promptengineering #promptinjection #indirectpromptinjection #ollama #llm #ai #openai #chatgpt #aisecurity #pentesting
▹ Additional References for Further Exploration:
▹ LearnPrompting's Prompt Injection VS Jailbreaking: What is the difference? - learnprompting.org/blog/2024/2/4/injection_jailbreaking
▹ LiveOverflow's Prompt Injection Vid - th-cam.com/video/Sv5OLj2nVAQ/w-d-xo.html
▹ 3Blue1Brown's GOATED Deep Learning Playlist - th-cam.com/video/aircAruvnKk/w-d-xo.html
▹ Wunderwuzzi's Sweet Microsoft Indirect Prompt Injection Writeup by Embrace The Red - embracethered.com/blog/posts/2024/m365-copilot-prompt-injection-tool-invocation-and-data-exfil-using-ascii-smuggling/
▹ Wunderwuzzi's PoC Video - th-cam.com/video/A-ibygtWeYc/w-d-xo.html
▹ Simon Willison - Prompt injection and jailbreaking are not the same thing - simonwillison.net/2024/Mar/5/prompt-injection-jailbreaking/
▹ 3Blue1Brown Chapter 5, Deep Learning - th-cam.com/video/wjZofJX0v4M/w-d-xo.html
▹ Fabric by Daniel Miessler (The Example System Prompt, but really a goated resource for overall workflow augmentation!) - github.com/danielmiessler/fabric
▹ 🔬🧪Labs Used in the Video!🧪🔬
▹ WithSecure Labs Recruitment - github.com/WithSecureLabs/llm-vulnerable-recruitment-app/tree/main
▹ Web Security Academy - Indirect Prompt Injection - portswigger.net/web-security/llm-attacks/lab-indirect-prompt-injection
------------------------------------------------------------------------------
In this series, we take a look at different application architecture that involves Generative AI. Starting simply with this video, we cover the concept of Indirect Prompt Injection at a high level! The goal is to break down the concepts to not only hack, but talk about methodology and the mental steps we take in order to discover these vulnerabilities in the wild.
Timestamps:
0:00​ Why AI all of a sudden?
0:30 Need background? Check LiveOverflow & 3Blue1Brown
0:48 Indirect Prompt Injection vs. Prompt Injection
2:07 Some Impacts of Indirect Prompt Injection
3:30 Wunderwuzzi's REAL WORLD Indirect Prompt Injection to Data Exfiltration
4:33 Intro to Lab 1 - WithSecure Labs Recruitment Portal
5:16 Increased Complexity Increases Risk
5:38 Lab 1 START
8:08 What about XSS?
10:25 High-Level Methodology Discussion
14:55 Example Architecture Review for XPIA
17:50 Web Sec Academy - Black Box Methodology!
20:08 I was actually SHOCKED. I guess we did it?
22:20 Prompt Engineering Video and Realistic RAG Video soon!
มุมมอง: 2 009

วีดีโอ

Beginner's Guide to GenAI Application Hacking | Simple RAG Setup Means Simple Wins
มุมมอง 3.3K3 หลายเดือนก่อน
Part 1 - Hacking a Simple RAG Implementation from Medium! Retrieval Augmented Generation (RAG) systems include a retrieval mechanism into the workflow. This, of course, introduces the potential for vulnerabilities! In this first part, we're covering a super simple implementation we found on Medium. Much more to come! We'll soon cover RAG systems that use other data sources like files, cloud sto...
Understanding JWTs Helped Find IRL Bugs | JWT Hacking Part 1
มุมมอง 4179 หลายเดือนก่อน
Hacking JWTs! Portswigger Web Security Academy JWT authentication bypass via unverified signature - portswigger.net/web-security/jwt/lab-jwt-authentication-bypass-via-unverified-signature ▹ SKIP TO LAB - 5:12 ▹ Watch me Live on Twitch - twitch.tv/garr_7 ▹ Shoutout to Shikairi for the Editing! - _shikairi #JWThacking #hacker #bugbounty #website ▹ Additional References for Further Exp...
HTTP Host Header Attacks Lab Breakdown: Host header authentication bypass
มุมมอง 1.5K2 ปีที่แล้ว
▹ Watch me Live on Twitch every Monday and Thursday! - twitch.tv/garr_7 Portswigger Web Security Academy HTTP Host Header Attacks Lab: Host header authentication bypass - portswigger.net/web-security/host-header/exploiting/lab-host-header-authentication-bypass Additional References for Further Exploration: Garr's Walkthrough of HTTP Host Header Attacks Lab: Basic password reset poisoning - th-c...
HTTP Host Header Attacks Lab Breakdown: Basic password reset poisoning
มุมมอง 4K2 ปีที่แล้ว
▹ Watch me Live on Twitch every Monday and Thursday! - twitch.tv/garr_7 Portswigger Web Security Academy HTTP Host Header Attacks Lab: Basic password reset poisoning - portswigger.net/web-security/host-header/exploiting/password-reset-poisoning/lab-host-header-basic-password-reset-poisoning Additional References for Further Exploration: PortSwigger's Host Header Attacks Resource - portswigger.n...
Cross-Site Scripting Lab Breakdown: Stored XSS into HTML context with nothing encoded
มุมมอง 9902 ปีที่แล้ว
▹ Watch me Live on Twitch every Monday and Thursday! - twitch.tv/garr_7 Portswigger Web Security Academy Cross-Site Scripting (XSS) Lab: Stored XSS into HTML context with nothing encoded - portswigger.net/web-security/cross-site-scripting/stored/lab-html-context-nothing-encoded Additional References for Further Exploration: Reflected XSS into HTML context with nothing encoded - th-cam.com/video...
Cross-Site Scripting Lab Breakdown: Reflected XSS into HTML context with nothing encoded
มุมมอง 1.1K2 ปีที่แล้ว
▹ Watch me Live on Twitch every Monday and Thursday! - twitch.tv/garr_7 ▹ Twitter: garrghar Portswigger Web Security Academy Cross-Site Scripting (XSS) Lab: Reflected XSS into HTML context with nothing encoded - portswigger.net/web-security/cross-site-scripting/reflected/lab-html-context-nothing-encoded Additional References for Further Exploration: Awesome In-Depth XSS Breakdown by...
SSTI Complete Lab Breakdown: Server-side template injection with a custom exploit
มุมมอง 6K2 ปีที่แล้ว
▹ Watch me Live on Twitch every Monday and Thursday! - twitch.tv/garr_7 Portswigger Web Security Academy Server-Side Template Injection (SSTI) Lab: Server-side template injection with a custom exploit - portswigger.net/web-security/server-side-template-injection/exploiting/lab-server-side-template-injection-with-a-custom-exploit Additional References for Further Exploration: Solving this Live o...
SSTI Complete Lab Breakdown: Server-side template injection in a sandboxed environment
มุมมอง 4.5K2 ปีที่แล้ว
▹ Watch me Live on Twitch every Monday and Thursday! - twitch.tv/garr_7 Portswigger Web Security Academy Server-Side Template Injection (SSTI) Lab: Server-side template injection in a sandboxed environment - portswigger.net/web-security/server-side-template-injection/exploiting/lab-server-side-template-injection-in-a-sandboxed-environment Additional References for Further Exploration: My SSTI E...
SSTI Complete Lab Breakdown: SSTI w/ info disclosure via user-supplied objects
มุมมอง 4.3K2 ปีที่แล้ว
SSTI Complete Lab Breakdown: SSTI w/ info disclosure via user-supplied objects
SSTI Complete Lab Breakdown: Server-side template injection - unknown language - documented exploit
มุมมอง 5K2 ปีที่แล้ว
SSTI Complete Lab Breakdown: Server-side template injection - unknown language - documented exploit
SSTI Complete Lab Breakdown: Server-side template injection using documentation
มุมมอง 6K2 ปีที่แล้ว
SSTI Complete Lab Breakdown: Server-side template injection using documentation
SSTI Complete Lab Breakdown: Basic server-side template injection (code context)
มุมมอง 9K2 ปีที่แล้ว
SSTI Complete Lab Breakdown: Basic server-side template injection (code context)
SSTI Complete Lab Breakdown: Basic server-side template injection
มุมมอง 17K2 ปีที่แล้ว
SSTI Complete Lab Breakdown: Basic server-side template injection
XXE Lab Breakdown: Blind XXE with out-of-band interaction via XML parameter entities
มุมมอง 5K2 ปีที่แล้ว
XXE Lab Breakdown: Blind XXE with out-of-band interaction via XML parameter entities
XXE Lab Breakdown: Exploiting blind XXE to exfiltrate data using a malicious external DTD
มุมมอง 10K2 ปีที่แล้ว
XXE Lab Breakdown: Exploiting blind XXE to exfiltrate data using a malicious external DTD
XXE Lab Breakdown: Exploiting XInclude to retrieve files
มุมมอง 7K2 ปีที่แล้ว
XXE Lab Breakdown: Exploiting XInclude to retrieve files
XXE Lab Breakdown: Exploiting blind XXE to retrieve data via error messages
มุมมอง 5K2 ปีที่แล้ว
XXE Lab Breakdown: Exploiting blind XXE to retrieve data via error messages
XXE Lab Breakdown: Exploiting XXE to retrieve data by repurposing a local DTD
มุมมอง 3.9K2 ปีที่แล้ว
XXE Lab Breakdown: Exploiting XXE to retrieve data by repurposing a local DTD
XXE Lab Breakdown: Exploiting XXE to perform SSRF attacks
มุมมอง 12K2 ปีที่แล้ว
XXE Lab Breakdown: Exploiting XXE to perform SSRF attacks
XXE Lab Breakdown: Blind XXE with out-of-band interaction
มุมมอง 8K2 ปีที่แล้ว
XXE Lab Breakdown: Blind XXE with out-of-band interaction
XXE Lab Breakdown: Exploiting XXE using external entities to retrieve files
มุมมอง 18K2 ปีที่แล้ว
XXE Lab Breakdown: Exploiting XXE using external entities to retrieve files
XXE Lab Breakdown: Exploiting XXE via image file upload
มุมมอง 9K2 ปีที่แล้ว
XXE Lab Breakdown: Exploiting XXE via image file upload
Learning XXE with PortSwigger's Web Security Academy - Part 2
มุมมอง 8862 ปีที่แล้ว
Learning XXE with PortSwigger's Web Security Academy - Part 2
Learning XXE with PortSwigger's Web Security Academy - Part 1
มุมมอง 1.9K2 ปีที่แล้ว
Learning XXE with PortSwigger's Web Security Academy - Part 1

ความคิดเห็น

  • @محمدالطيب-ن7ر
    @محمدالطيب-ن7ر 5 วันที่ผ่านมา

    If possible you can make a series of each lap completely

  • @محمدالطيب-ن7ر
    @محمدالطيب-ن7ر 5 วันที่ผ่านมา

    Thanks dear , i really appreciate and you are only the one who i understand from never stop and keep going through

  • @janekmachnicki2593
    @janekmachnicki2593 หลายเดือนก่อน

    Best explanation ever heard .Thanks Pale

  • @tbltjrd3918
    @tbltjrd3918 หลายเดือนก่อน

    Somebody have any idea why there is a Submit feedpack endpoint in this lab ?

  • @jxkz7
    @jxkz7 2 หลายเดือนก่อน

    Full video please?

  • @chronicallychill9979
    @chronicallychill9979 3 หลายเดือนก่อน

    I thought we were weighting system prompts more than user prompts. Aren't we?

  • @fellzer
    @fellzer 3 หลายเดือนก่อน

    Bit too much on the EQ brotha. Good video tho.

  • @comosaycomosah
    @comosaycomosah 3 หลายเดือนก่อน

    dude you make such good videos

    • @7SeasSecurity
      @7SeasSecurity 3 หลายเดือนก่อน

      Really appreciate the kind words! We put a lot of work in these videos, so that’s definitely much appreciated.

    • @comosaycomosah
      @comosaycomosah 3 หลายเดือนก่อน

      @@7SeasSecurity oh for sure dude! And ohhh yea I bet! I've seriously considered making videos or blog content and will again but it's so much work. Been busy learning lol

  • @KiDR_IANI
    @KiDR_IANI 3 หลายเดือนก่อน

    💙💙💙

  • @Terry-f6f
    @Terry-f6f 3 หลายเดือนก่อน

    Am I the only one that's got the audio and video not completely synced? super trippy

    • @Terry-f6f
      @Terry-f6f 3 หลายเดือนก่อน

      Maybe I'm having a stroke? lol

    • @Red.Dots.
      @Red.Dots. 3 หลายเดือนก่อน

      Its AI

  • @salzkasten
    @salzkasten 3 หลายเดือนก่อน

    With the rise of AI you'll pretty much have to do this as an applicant.

  • @superfliping
    @superfliping 3 หลายเดือนก่อน

    Have you heard of a prompt injection entering a Facebook backdoor database? Iteration internal promps loops.

  • @chrisalupului
    @chrisalupului 3 หลายเดือนก่อน

    Thanks for covering the black box perspective! Awesome video!

    • @7SeasSecurity
      @7SeasSecurity 3 หลายเดือนก่อน

      Always glad to tackle the black box side of the house! Appreciate the kind words and you as always!

  • @SensuBeem
    @SensuBeem 3 หลายเดือนก่อน

    The ratio of brain rot to hacking is perfect in this video. good job!

    • @7SeasSecurity
      @7SeasSecurity 3 หลายเดือนก่อน

      It’s a tough balance!

  • @adyp487
    @adyp487 3 หลายเดือนก่อน

    I will take your advice and not marry these ideas

    • @7SeasSecurity
      @7SeasSecurity 3 หลายเดือนก่อน

      I love it! Thanks for watching and appreciate your time!

  • @ThetHtooZaw-pv3wl
    @ThetHtooZaw-pv3wl 3 หลายเดือนก่อน

    Do more on code review please

    • @7SeasSecurity
      @7SeasSecurity 3 หลายเดือนก่อน

      Definitely will do! Like I mentioned in the video, the overall prompt injection / engineering video will definitely involve code review! Thanks for checking out the video!

  • @adyp487
    @adyp487 3 หลายเดือนก่อน

    👀

  • @Problemsun
    @Problemsun 3 หลายเดือนก่อน

    First

    • @7SeasSecurity
      @7SeasSecurity 3 หลายเดือนก่อน

      Yeah you were!

  • @Coffee-and-Pizza
    @Coffee-and-Pizza 3 หลายเดือนก่อน

    He is in a sandbox, now scape from there. 😉

  • @dirtydevotee
    @dirtydevotee 3 หลายเดือนก่อน

    (4:16) While I'm sure that was just for demonstration purposes, that image illustrating the "Neil Armstrong" and "Charles Lindbergh" mixup is a total fabrication. A hallucination is when a word with double meaning triggers a crossover in the LLM. Charles Lindbergh has zero connection to the Lunar Pioneer mission. The better example would be if "Michael Jackson" (who invented the "moonwalk") somehow ended up as the first person to "walk" the "moon". Also, there's never multiple hallucinations in the same prompt (1951 AND Lindbergh AND Pioneer). And it's not "broadcasted". That's not a word. It's "broadcast" (it was "cast broadly"). There's a 0% chance that an LLM output the word "broadcasted".

  • @MackinsonTheGreat
    @MackinsonTheGreat 3 หลายเดือนก่อน

    Ask an AI to hack into an AI

    • @7SeasSecurity
      @7SeasSecurity 3 หลายเดือนก่อน

      Yup 100%! Tools like PyRIT and garak are perfect for that

  • @BloxFruitBandits
    @BloxFruitBandits 3 หลายเดือนก่อน

    Here for the Portal V sound

  • @Problemsun
    @Problemsun 3 หลายเดือนก่อน

    Thank you for the video. I like your explanations. Please make more

  • @Problemsun
    @Problemsun 3 หลายเดือนก่อน

    first

  • @pebble1
    @pebble1 4 หลายเดือนก่อน

    When the AI apocalypse happens, Garr_7 is gonna be the safest man on Earth

    • @7SeasSecurity
      @7SeasSecurity 4 หลายเดือนก่อน

      One can only hope.

  • @HEXiT_
    @HEXiT_ 4 หลายเดือนก่อน

    joined the twitch and tried to leave my adhd at the door, i swear... ;) well worth the effort to catch live.

    • @7SeasSecurity
      @7SeasSecurity 4 หลายเดือนก่อน

      Always appreciate you, HEXiT! Thanks for stopping by!

  • @ThetHtooZaw-pv3wl
    @ThetHtooZaw-pv3wl 4 หลายเดือนก่อน

    I've been waiting more contents from you like years. Please upload more I beg. You explain things so well and clearly.

    • @7SeasSecurity
      @7SeasSecurity 4 หลายเดือนก่อน

      Really appreciate the kind words! It's been a roller coaster lately, but we'll work to try and keep uploading more consistently!

  • @Dayanandhansubramani-rj6tc
    @Dayanandhansubramani-rj6tc 4 หลายเดือนก่อน

    After Long time a Video in TH-cam :) except Live Stream :)

  • @jazzyonline8793
    @jazzyonline8793 4 หลายเดือนก่อน

    First time viewer, loved the content mate ! Curious to see you prompt inject a RAG model with knowledge stored as files (instead of SQL).

    • @7SeasSecurity
      @7SeasSecurity 4 หลายเดือนก่อน

      Really appreciate that! I've been diving super heavy in hacking apps leveraging GenAI, so glad to hear it's been enjoyable! I'll most likely break this down into a more digestible, direct video when I have the bandwidth to record / edit. Re: file-based RAG - That's definitely an interesting scenario and definitely happy to tackle that! Probably will start with local files, then expand the attack surface by including file shares, cloud storage, etc. Appreciate the recommendation and getting the wheels turning!

  • @minhld8736
    @minhld8736 4 หลายเดือนก่อน

    Hi, many thanks!

  • @thinhdang9256
    @thinhdang9256 4 หลายเดือนก่อน

    may i access the lab ftp ??? i want to practic that chall

  • @cowid
    @cowid 5 หลายเดือนก่อน

    The best explanation on PortSwigger XXE OOB out there.

  • @manondu44
    @manondu44 5 หลายเดือนก่อน

    Thanks for the video it is very helpful ! However, I still did not get why do you use a stack entity and why you do not directly use the exfil entity ?

  • @techvertos4165
    @techvertos4165 5 หลายเดือนก่อน

    Where can I get vulnerable code ?

  • @j4ck_d4niels
    @j4ck_d4niels 6 หลายเดือนก่อน

    thanks for sharing this man, I never could understand how this works without watching this

  • @Carlos-kc8vx
    @Carlos-kc8vx 6 หลายเดือนก่อน

    excellent quality I love so much you video man

  • @309electronics5
    @309electronics5 7 หลายเดือนก่อน

    I actually did this with a tuya iot camera and got a uboot shell by removing a 'silent' argument in the binary and flashing it on and i also set bootdelay to 3 in the binary and replaced the password hash with my own

  • @aliel-shennawy3670
    @aliel-shennawy3670 7 หลายเดือนก่อน

    Great work, thanks👏

  • @z1ro_zb
    @z1ro_zb 7 หลายเดือนก่อน

    great explanation!, you should make more portswigger videos🙌

  • @z1ro_zb
    @z1ro_zb 7 หลายเดือนก่อน

    great video!

    • @7SeasSecurity
      @7SeasSecurity 7 หลายเดือนก่อน

      Really appreciate that!

  • @efran.calikoglu
    @efran.calikoglu 8 หลายเดือนก่อน

    You're one of my fav web app hacker. I cannot wait for the other videos.

    • @7SeasSecurity
      @7SeasSecurity 7 หลายเดือนก่อน

      Really appreciate that! Definitely more videos to come!

  • @alicia2111
    @alicia2111 8 หลายเดือนก่อน

    *promosm* 😄

  • @vupham5745
    @vupham5745 8 หลายเดือนก่อน

    Which terminal to read uart?

    • @7SeasSecurity
      @7SeasSecurity 8 หลายเดือนก่อน

      Good question! I use screen personally, but I’ve heard great things about Minicom. Minicom lets you change baud rate on the fly, which is nice. I just use screen out of habit, but there are lots of options!

  • @suder54ULs
    @suder54ULs 8 หลายเดือนก่อน

    Best resource, among all i have to check. Good Keep going

    • @7SeasSecurity
      @7SeasSecurity 7 หลายเดือนก่อน

      Really appreciate that!

  • @droidh4x0r6
    @droidh4x0r6 9 หลายเดือนก่อน

    Thank you for taking the time to do this, to edit the videos and for sharing!

    • @7SeasSecurity
      @7SeasSecurity 7 หลายเดือนก่อน

      Definitely glad to share the knowledge and lessons learned!

  • @thewifiaddict
    @thewifiaddict 9 หลายเดือนก่อน

    Another amazing video!

  • @nishantdalvi9470
    @nishantdalvi9470 9 หลายเดือนก่อน

    Finally your back 😁 and what a coincidence I was learning about JWTs only

    • @7SeasSecurity
      @7SeasSecurity 9 หลายเดือนก่อน

      Glad to be back!

  • @armandoflores4783
    @armandoflores4783 9 หลายเดือนก่อน

    Great Video! You're an awesome teacher! Keep pushing out videos!

    • @7SeasSecurity
      @7SeasSecurity 9 หลายเดือนก่อน

      Really appreciate the kind words! We'll work on trying to get more videos out!

  • @MSecYT
    @MSecYT 9 หลายเดือนก่อน

    Garr the literal wizard 🧙🔥🔥🔥

  • @7SeasSecurity
    @7SeasSecurity 9 หลายเดือนก่อน

    Long time no see, y'all! This video was recorded way back in 2022 and it covers the first Web Security Academy Lab. I added a bit of updates, but it should be a good "primer" for understanding JWTs and the "why" behind hacking them! We'll be covering the rest of the labs soon for a more in-depth, comprehensive methodology around JWTs, but we hope you enjoy this initial video!