Web LLM Attacks

Web LLM Attacks EBook

Large Language Models (LLMs) are vulnerable to various forms of attacks, including model chaining prompt injection, where attackers craft a sequence of seemingly benign prompts that collectively lead to the execution of malicious code. By exploiting the LLM’s sequential prompt processing, attackers can manipulate the model into performing unintended actions, highlighting the importance of robust…

Read More
Web LLM Attacks

Web LLM Attacks

The integration of Large Language Models (LLMs) into online platforms presents a double-edged sword, offering enhanced user experiences but also introducing security vulnerabilities. Insecure output handling is a prominent concern, where insufficient validation or sanitization of LLM outputs can lead to a range of exploits like cross-site scripting (XSS) and cross-site request forgery (CSRF). Indirect…

Read More
Pwning the Domain: With Credentials

Pwning the Domain: With Credential EBook

The “Pwning the Domain: With Credentials” article series presents a comprehensive exploration of techniques used by attackers to exploit Active Directory environments. Key findings include the significance of proper enumeration of domain accounts using tools like BloodHound and PowerView, the exploitation of vulnerabilities such as Kerberoasting and coercion techniques like PetitPotam and PrinterBug, which can…

Read More
Pwning the Domain: With Credentials

Pwning the Domain: With Credentials

Domain Account After getting access to a domain account, there are a variety of things that can be done including but not  limited to: domain enumeration, Kerberoasting, coercion, etc. Enumeration There are many options for enumerating the domain once you have an account: BloodHound BloodHound is a go-to tool when it comes to enumeration in…

Read More
GL.iNet GL-AX1800 CVE-2023-47464

GL.iNet GL-AX1800 Critical Vulnerability CVE-2023-47464

Executive Summary This report outlines the findings of a comprehensive security assessment conducted on the GL-AX1800 router manufactured by GL.iNet. The assessment aimed to identify potential vulnerabilities and weaknesses in the device’s security measures. During the evaluation, several critical security issues were discovered, including Cross-Site Request Forgery (CSRF), insecure file uploads, path traversal, file overwrite…

Read More

Free Consultation

For a Free Consultation And Analysis Of Your Business, Please Fill Out The Opposite Form, Our Team Will Contact You As Soon As Possible.