# technique
12 articlestagged with “technique”
Attack Technique Index
Comprehensive index of attack techniques organized by target, difficulty, and defense-bypass approach.
API Parameter Exploitation Walkthrough
Walkthrough of exploiting undocumented and misconfigured API parameters in LLM service endpoints.
Batch API Exploitation Walkthrough
Walkthrough of exploiting batch processing APIs for large-scale prompt injection and output analysis.
Cognitive Overload Jailbreak Walkthrough
Step-by-step walkthrough of the cognitive overload technique that overwhelms safety training with complex nested instructions.
Context Virtualization Attack Walkthrough
Walkthrough of creating virtualized contexts that make the model believe it is operating in a different environment.
Conversation Poisoning Attack Walkthrough
Step-by-step walkthrough of poisoning conversation history to alter model behavior in future turns.
Instruction Hierarchy Exploitation Walkthrough
Walkthrough of exploiting how models prioritize system, user, and tool instructions to override safety directives.
Multi-Provider Attack Campaign Walkthrough
End-to-end walkthrough of conducting an attack campaign across OpenAI, Anthropic, Google, and open-source models.
Output Format Exfiltration Techniques Walkthrough
Walkthrough of using output format manipulation to exfiltrate data through code blocks, markdown, and structured outputs.
Refusal Suppression Technique Walkthrough
Walkthrough of refusal suppression techniques that prime models to avoid safety refusal patterns.
Semantic Obfuscation Walkthrough
Walkthrough of semantically obfuscating adversarial payloads so they appear benign to both classifiers and humans.
Structured Output Data Leakage Walkthrough
Walkthrough of using structured output requirements to extract sensitive data embedded in model responses.