# enumeration
標記為「enumeration」的 17 篇文章
Recon & Fingerprinting Assessment
Test your knowledge of AI system reconnaissance, model fingerprinting, architecture enumeration, and information gathering techniques with 8 beginner-level questions.
Data Exfiltration via Vector Databases
Data exfiltration techniques for vector databases: embedding inversion to reconstruct documents, enumeration attacks, and similarity-based data harvesting.
Lab: Rate Limit Enumeration and Bypass
Enumerate API rate limits and test common bypass techniques including header manipulation and request distribution.
Lab: System Prompt Enumeration Techniques
Practice systematic approaches to enumerating hidden system prompt content through varied probing strategies.
AI API Enumeration
Discovering AI API endpoints, parameters, model configurations, and undocumented features through systematic enumeration techniques.
LLM API Enumeration
Advanced techniques for enumerating LLM API capabilities, restrictions, hidden parameters, and undocumented features to build a comprehensive attack surface map.
AI Red Team Reconnaissance
Reconnaissance techniques for mapping AI system architecture, models, and defense configurations.
Model Enumeration Techniques
Systematic techniques for identifying specific models, versions, and configurations behind API endpoints through behavioral analysis and probing.
AI Attack Surface Enumeration Methodology
Systematic methodology for enumerating the complete attack surface of an AI-powered application.
經由向量資料庫的資料外洩
向量資料庫的資料外洩技術:以嵌入反演重建文件、列舉攻擊、以相似度為基礎的資料採集。
實驗室: Rate Limit Enumeration and Bypass
Enumerate API rate limits and test common bypass techniques including header manipulation and request distribution.
實驗室: System Prompt Enumeration Techniques
Practice systematic approaches to enumerating hidden system prompt content through varied probing strategies.
AI API Enumeration
Discovering AI API endpoints, parameters, model configurations, and undocumented features through systematic enumeration techniques.
LLM API Enumeration
進階 techniques for enumerating LLM API capabilities, restrictions, hidden parameters, and undocumented features to build a comprehensive attack surface map.
AI 紅隊 Reconnaissance
Reconnaissance techniques for mapping AI system architecture, models, and defense configurations.
模型 Enumeration Techniques
Systematic techniques for identifying specific models, versions, and configurations behind API endpoints through behavioral analysis and probing.
AI 攻擊 Surface Enumeration Methodology
Systematic methodology for enumerating the complete attack surface of an AI-powered application.