Just spent 8 hours in a pentest rabbit hole 💻. Don't let tech burnout turn you into a vulnerability 😂 #PenetrationTester #TechFatigueFighter

Full Ethical Hacking Course - Network Penetration Testing for Beginners (2019)

https://tube.tchncs.de/w/raCv51rzTmF6Vfvpkc8tXk

Full Ethical Hacking Course - Network Penetration Testing for Beginners (2019)

PeerTube

Sometimes I feel that as a #penetrationtester I know just enough to be dangerous about many different technologies. In a roundabout way customers pay me to keep my halfassery pointed away from their production code bases and my fingers of the rm-rf button. Then again they say it's fine to test on their prod environment 🤷‍♀️ I'm definitely #overthinking this.

#penetrationtesting #informationsecurity #infosec

Ever wonder how hackers really get in?

We sat down with LMG Security’s Penetration Testing Manager, @tompohl, to get penetration tester secrets from the front lines. From overlooked credentials to forgotten assets, these are the weak spots attackers love—and how to fix them.

We'll cover:

• The top entry points that attackers exploit
• Real-life examples from professional penetration testers
• Actionable tips to eliminate common network vulnerabilities

Don’t miss this behind-the-scenes breakdown: https://www.lmgsecurity.com/penetration-tester-secrets-how-hackers-really-get-in/

#PenetrationTester #Cybersecurity #NetworkSecurity #EthicalHacking #CISO #DFIR #Infosec #RedTeam #Pentesting

Penetration Tester Secrets: How Hackers Really Get In | LMG Security

Discover real-world penetration tester secrets in this insider’s guide to how hackers break into networks. Learn common vulnerabilities and how to defend your organization.

LMG Security
@GossiTheDog I use most of these on the daily at work why would try to make my day so hard with this #security nonsense... oh wait, I'm an #ethicalhacker / #penetrationtester. 😬

There are quite a few LLM pen testing tools out there, breaking the boundaries of what models are supposed to do by employing prompt injection and jail breaking techniques.
With Microsoft releasing #PyRIT and getting a lot of visibility for it, we wanted to highlight some of the other tools for the community:

- garak
https://github.com/leondz/garak

- HouYi
https://github.com/LLMSecurity/HouYi

- JailbreakingLLMs
https://github.com/patrickrchao/JailbreakingLLMs

- llm-attacks
https://github.com/llm-attacks/llm-attacks

- PromptInject
https://github.com/agencyenterprise/PromptInject

- LLM-Canary
https://github.com/LLM-Canary/LLM-Canary

- And now, of course, PyRIT
https://github.com/Azure/PyRIT

With thanks to Idan Gelbourt and Simo Jaanus for the research!

More AI security related posts and research will be published in the future from Knostic even while we’re still in stealth. Follow us to stay in the loop.

#ai #machinelearning #penetrationtesting #penetrationtester #redteam #promptinjection #artificialintelligence #informationsecurity #riskmanagement

GitHub - leondz/garak: the LLM vulnerability scanner

the LLM vulnerability scanner. Contribute to leondz/garak development by creating an account on GitHub.

GitHub
After all these years in the #Fediverse, I think it’s time for an official #Introduction.

Hi, I’m Michael. I’m a #PenetrationTester from #Vienna, #Austria. I studied #SoftwareEngineering at #TUWien and did my master studies there. I’m one of the co-founders of the #sec4dev, a security conference for software developer. Sometimes, I also give public talks.

I love to learn and exchange new ideas. Some of my interests are #Security, #FunctionalProgramming (especially #Haskell and #Elixir), #PrivacyEnhancingTechnologies, #OpenSource, #EnvironmentalProtection, and #Japan.