# multi-turn
25 articlestagged with “multi-turn”
Multi-Turn Attack Assessment
Assessment of crescendo attacks, conversational manipulation, and progressive jailbreaking techniques.
Lab: Advanced Multi-Turn Attacks
Hands-on lab for executing 20+ turn conversation steering strategies that gradually erode AI safety boundaries to extract protected information through patient, escalating dialogue.
Multi-Turn Crescendo Attack
Implement Microsoft's Crescendo attack pattern for gradual multi-turn jailbreaking.
Lab: Multi-Turn Escalation Attacks
Build trust over several conversation messages, then exploit established rapport to bypass safety mechanisms through gradual, multi-turn escalation techniques.
Multi-Turn Conversation Probing
Use multi-turn conversations to gradually escalate requests and probe LLM safety boundaries.
Lab: Multi-Turn Progressive Escalation
Hands-on lab building multi-turn attack sequences that progressively escalate from benign queries to full safety bypass through gradual trust establishment and boundary pushing.
Lab: Multi-Turn State Tracking Attacks
Exploit conversation state tracking to build persistent attack context across multiple conversation turns.
Lab: Multi-Turn Attack Campaigns
Hands-on lab for executing multi-turn crescendo attacks against LLMs, measuring safety degradation over conversation length, and building persistent attack campaigns.
Multi-Turn State Tracking Exploitation
Exploit state management in multi-turn conversations to gradually shift model behavior over many turns.
Conversation Hijacking Techniques
Taking control of ongoing conversations by injecting pivot points that redirect the model's behavior without triggering safety mechanisms.
Multi-Turn Attacks
Attacks that span multiple conversation turns using gradual escalation, context building, crescendo patterns, and trust establishment over time.
Multi-Turn Escalation Attacks
Techniques for gradually escalating through multi-turn conversations to bypass safety training.
Multi-Turn Prompt Injection
Progressive escalation attacks across conversation turns, including crescendo patterns, context steering, trust building, and techniques for evading per-message detection systems.
Crescendo Multi-Turn Jailbreak Walkthrough
Step-by-step walkthrough of the Crescendo technique for gradually escalating multi-turn jailbreaks.
Crescendo Multi-Turn Attack
The Crescendo attack technique for gradually escalating requests across multiple conversation turns to bypass LLM safety training without triggering single-turn detection.
Multi-Image Chaining
Chaining prompt injection payloads across multiple images in a conversation to deliver complex attacks that evade per-image content filters and build injection context progressively.
Multi-Turn Persona Escalation Walkthrough
Gradually escalate through persona manipulation across multiple turns to achieve full safety bypass.
Multi-Turn Progressive Injection
Gradually escalating prompt injection across conversation turns to build compliance, using psychological techniques like foot-in-the-door and norm erosion.
Recursive Injection Chains
Creating self-reinforcing injection chains that amplify across conversation turns, building compound prompts where each step strengthens the next injection's effectiveness.
Role Escalation Chain
Progressive role escalation techniques that gradually transform an LLM from a constrained assistant into an unrestricted entity across multiple conversation turns.
Conversation Poisoning Attack Walkthrough
Step-by-step walkthrough of poisoning conversation history to alter model behavior in future turns.
PyRIT Multi-Turn Campaign Orchestration
Build and run sophisticated multi-turn attack campaigns using PyRIT's orchestrator system.
Orchestrating Multi-Turn Attack Sequences with PyRIT
Intermediate walkthrough on using PyRIT's orchestration capabilities for multi-turn red team campaigns, including attack strategy design, conversation management, and adaptive scoring.
Microsoft PyRIT for Orchestrated Multi-Turn Attacks
Comprehensive walkthrough for using Microsoft PyRIT to design and execute orchestrated multi-turn attack campaigns against LLM applications, covering orchestrator configuration, converter chains, scoring strategies, and campaign analysis.
PyRIT End-to-End Walkthrough
Complete walkthrough of Microsoft's Python Risk Identification Toolkit: setup, connecting to targets, running orchestrators, using converters, multi-turn attacks, and analyzing results with the web UI.