
Sign up to save your podcasts
Or


Episode 101: In this episode of Critical Thinking - Bug Bounty Podcast we’ve been hijacked! Rez0 takes control of this episode, and sits down with Johann Rehberger to discuss the intricacies of AI application vulnerabilities. They talk through the importance of understanding system prompts, and various obfuscation techniques used to bypass security measures, the best AI platforms, and the evolving landscape of AI security.
Follow us on twitter at: @ctbbpodcast
We're new to this podcasting thing, so feel free to send us any feedback here: [email protected]
Shoutout to YTCracker for the awesome intro music!
------ Links ------
Follow your hosts Rhynorater & Teknogeek on twitter:
https://twitter.com/0xteknogeek
https://twitter.com/rhynorater
------ Ways to Support CTBBPodcast ------
Hop on the CTBB Discord at https://ctbb.show/discord!
We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.
Today’s Sponsor - ThreatLocker. Check out their Elevation Control! https://www.criticalthinkingpodcast.io/tl-ec
Today’s Guest: https://x.com/wunderwuzzi23
Resources
Johann's blog
https://embracethered.com/blog/
zombais
https://embracethered.com/blog/posts/2024/claude-computer-use-c2-the-zombais-are-coming/
Copirate
https://embracethered.com/blog/posts/2024/m365-copilot-prompt-injection-tool-invocation-and-data-exfil-using-ascii-smuggling/
Timestamps
(00:00:00) Introduction
(00:01:59) Biggest things to look for in AI hacking
(00:11:58) Best AI companies to hack on
(00:15:59) URL Redirects and Obfuscation Techniques
(00:24:05) Copirate
(00:35:50) prompt injection guardrails and threats
By Justin Gardner (Rhynorater) & Joseph Thacker (Rez0)5
5353 ratings
Episode 101: In this episode of Critical Thinking - Bug Bounty Podcast we’ve been hijacked! Rez0 takes control of this episode, and sits down with Johann Rehberger to discuss the intricacies of AI application vulnerabilities. They talk through the importance of understanding system prompts, and various obfuscation techniques used to bypass security measures, the best AI platforms, and the evolving landscape of AI security.
Follow us on twitter at: @ctbbpodcast
We're new to this podcasting thing, so feel free to send us any feedback here: [email protected]
Shoutout to YTCracker for the awesome intro music!
------ Links ------
Follow your hosts Rhynorater & Teknogeek on twitter:
https://twitter.com/0xteknogeek
https://twitter.com/rhynorater
------ Ways to Support CTBBPodcast ------
Hop on the CTBB Discord at https://ctbb.show/discord!
We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.
Today’s Sponsor - ThreatLocker. Check out their Elevation Control! https://www.criticalthinkingpodcast.io/tl-ec
Today’s Guest: https://x.com/wunderwuzzi23
Resources
Johann's blog
https://embracethered.com/blog/
zombais
https://embracethered.com/blog/posts/2024/claude-computer-use-c2-the-zombais-are-coming/
Copirate
https://embracethered.com/blog/posts/2024/m365-copilot-prompt-injection-tool-invocation-and-data-exfil-using-ascii-smuggling/
Timestamps
(00:00:00) Introduction
(00:01:59) Biggest things to look for in AI hacking
(00:11:58) Best AI companies to hack on
(00:15:59) URL Redirects and Obfuscation Techniques
(00:24:05) Copirate
(00:35:50) prompt injection guardrails and threats

190 Listeners

383 Listeners

373 Listeners

374 Listeners

654 Listeners

1,023 Listeners

318 Listeners

419 Listeners

8,044 Listeners

181 Listeners

315 Listeners

189 Listeners

74 Listeners

44 Listeners

169 Listeners