Prompt Injection: the short story

LLM attack surface - learnoffsec

Prompt injection is an attack where an adversary hides instructions inside inputs (text, files, images, web pages, metadata, etc.) that a model treats as commands and the model follows them. The fundamental problem is simple-looking but deep: Large Language Models (LLMs) treat natural language both as data and as instructions, and attackers exploit that ambiguity. … Read more

Thick Client (Desktop) Application Penetration Testing – Part-2

Thick Client (Desktop) Application Penetration Testing - Part-2

Privilege Escalation using RegShot DLL Hijacking Sensitive information in Memory (Dumping connection string from Memory) Let’s try to log in with this credential using HediSQL: Remediation: Sensitive information should be encrypted. If encryption is not possible, use obfuscation techniques based on the application’s severity. Passwords In Registry Remediation: Encrypt passwords before storage, or store garbage … Read more

Most useful Linux network commands

most useful Linux Network Commands

Linux Network Commands: In the world of networking, having the right tools at your disposal can mean the difference between a smooth, seamless connection & a frustrating, time-consuming experience. While there are plenty of GUI-based network tools out there, seasoned Linux users know that the command line is often the best place to turn when … Read more

Docker Improper Write Permissions

docker improper write permissions for volumes and host filesystems

Greetings fellow Docker enthusiasts! Have you ever come across a pesky issue with docker improper write permissions for volumes & host filesystems when deploying your containers? If so, you’re not alone. This is a common problem that many Docker users face and it can be frustrating trying to figure out how to resolve it. But … Read more