Prompt Injection: the short story

LLM attack surface - learnoffsec

Prompt injection is an attack where an adversary hides instructions inside inputs (text, files, images, web pages, metadata, etc.) that a model treats as commands and the model follows them. The fundamental problem is simple-looking but deep: Large Language Models (LLMs) treat natural language both as data and as instructions, and attackers exploit that ambiguity. … Read more

Thick Client (Desktop) Application Penetration Testing – Part-2

Thick Client (Desktop) Application Penetration Testing - Part-2

Privilege Escalation using RegShot DLL Hijacking Sensitive information in Memory (Dumping connection string from Memory) Let’s try to log in with this credential using HediSQL: Remediation: Sensitive information should be encrypted. If encryption is not possible, use obfuscation techniques based on the application’s severity. Passwords In Registry Remediation: Encrypt passwords before storage, or store garbage … Read more

Thick Client (Desktop) Application Penetration Testing – Part-1

Thick Client (Desktop) Application Penetration Testing - Part-1

INFORMATION GATHERING Using the tool CFF Explorer Using the SysInternal Suites Let’s start … Using the Tool Wireshark Using the Tool ProcMon (Login Credentials in Registry Entry) TRAFFIC ANALYSIS Traffic Analysis using Wireshark Filter technique 1 Filter technique 2 Using Tool Echo Mirage

Most useful Linux network commands

most useful Linux Network Commands

Linux Network Commands: In the world of networking, having the right tools at your disposal can mean the difference between a smooth, seamless connection & a frustrating, time-consuming experience. While there are plenty of GUI-based network tools out there, seasoned Linux users know that the command line is often the best place to turn when … Read more