| ▲ | tptacek 2 days ago | ||||||||||||||||||||||||||||||||||
Can you be more specific about the kind of "bypass attack" you think an agent can't find? Like, provide a schematic example? | |||||||||||||||||||||||||||||||||||
| ▲ | cookiengineer a day ago | parent [-] | ||||||||||||||||||||||||||||||||||
SSL Heartbleed is a good example. Or pretty much any vulnerability that needs understanding of how memset or malloc works, or anything where you have to use leaky functions to create a specific offset because that's where the return (eip) in assembly is, so that you can modify/exploit that jmp or cmp call. These kind of things are very hard for LLMs because they tend to forget way too much important information about both the code (in the branching sense) and the program (in the memory sense). I can't provide a schematic for this, but it's pretty common in binary exploitation CTF events, and kind of mandatory knowledge about exploit development. I listed some nice CTFs we did with our group in case you wanna know more about these things [1]. I think in regards to LLMs and this bypass/sidechannel attacks topic I'd refer to the Fusion CTF [2] specifically, because it covers a lot of examples. | |||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||