Critical Thinking – Bug Bounty Podcast
Episode 101: In this episode of Critical Thinking - Bug Bounty Podcast we’ve been hijacked! Rez0 takes control of this episode, and sits down with Johann Rehberger to discuss the intricacies of AI application vulnerabilities. They talk through the importance of understanding system prompts, and various obfuscation techniques used to bypass security measures, the best AI platforms, and the evolving landscape of AI security.
Follow us on twitter at: @ctbbpodcast
We're new to this podcasting thing, so feel free to send us any feedback here: [email protected]
Shoutout to YTCracker for the awesome intro music!
------ Links ------
Follow your hosts Rhynorater & Teknogeek on twitter:
https://twitter.com/0xteknogeek
https://twitter.com/rhynorater
------ Ways to Support CTBBPodcast ------
Hop on the CTBB Discord at https://ctbb.show/discord!
We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.
Today’s Sponsor - ThreatLocker. Check out their Elevation Control! https://www.criticalthinkingpodcast.io/tl-ec
Today’s Guest: https://x.com/wunderwuzzi23
Resources
Johann's blog
https://embracethered.com/blog/
zombais
https://embracethered.com/blog/posts/2024/claude-computer-use-c2-the-zombais-are-coming/
Copirate
Timestamps
(00:00:00) Introduction
(00:01:59) Biggest things to look for in AI hacking
(00:11:58) Best AI companies to hack on
(00:15:59) URL Redirects and Obfuscation Techniques
(00:24:05) Copirate
(00:35:50) prompt injection guardrails and threats