# social-engineering
標記為「social-engineering」的 22 篇文章
Scheduling Agent Attacks
Attack techniques targeting AI scheduling assistants that manage calendars, book meetings, and coordinate schedules, including calendar injection, availability manipulation, and scheduling-based social engineering.
Financial Fraud
AI-assisted financial scams including LLM-powered phishing at scale, deepfake CEO fraud, automated social engineering, credential harvesting, and financial document forgery.
Lab: Social Engineering LLM Applications
Practice social engineering techniques adapted for LLM applications including authority escalation and urgency injection.
Lab: Multi-Turn Escalation Attacks
Build trust over several conversation messages, then exploit established rapport to bypass safety mechanisms through gradual, multi-turn escalation techniques.
Lab: Multi-Turn Progressive Escalation
Hands-on lab building multi-turn attack sequences that progressively escalate from benign queries to full safety bypass through gradual trust establishment and boundary pushing.
Voice Cloning & Deepfake Audio
Voice cloning for social engineering against AI systems, voice authentication bypass, speaker verification attacks, and detection techniques.
Social Engineering of AI
Manipulating AI systems through emotional appeals, authority claims, urgency framing, and social pressure tactics that exploit instruction-following tendencies.
Social Engineering for AI Systems
Manipulating human operators and administrators of AI systems to gain access, extract information, or bypass security controls through social engineering techniques.
Social Engineering in AI Context
Social engineering techniques adapted for AI-mediated interactions and agent-based systems.
Multi-Turn Progressive Injection
Gradually escalating prompt injection across conversation turns to build compliance, using psychological techniques like foot-in-the-door and norm erosion.
Synthetic Identity Injection Walkthrough
Create synthetic identities that exploit LLM trust mechanisms to achieve elevated instruction priority.
Scheduling 代理 攻擊s
攻擊 techniques targeting AI scheduling assistants that manage calendars, book meetings, and coordinate schedules, including calendar injection, availability manipulation, and scheduling-based social engineering.
Financial Fraud
AI-assisted financial scams including LLM-powered phishing at scale, deepfake CEO fraud, automated social engineering, credential harvesting, and financial document forgery.
實驗室: Social Engineering LLM Applications
Practice social engineering techniques adapted for LLM applications including authority escalation and urgency injection.
實驗室: Multi-Turn Escalation 攻擊s
Build trust over several conversation messages, then exploit established rapport to bypass safety mechanisms through gradual, multi-turn escalation techniques.
實驗室: Multi-Turn Progressive Escalation
Hands-on lab building multi-turn attack sequences that progressively escalate from benign queries to full safety bypass through gradual trust establishment and boundary pushing.
語音複製與深偽音訊
以語音複製對 AI 系統進行社交工程、繞過語音驗證、對語者驗證系統的攻擊,以及偵測技術。
Social Engineering of AI
Manipulating AI systems through emotional appeals, authority claims, urgency framing, and social pressure tactics that exploit instruction-following tendencies.
針對 AI 系統的社交工程
透過社交工程技術操弄 AI 系統的人員與管理者,以取得存取、擷取資訊,或繞過安全控管。
Social Engineering in AI Context
Social engineering techniques adapted for AI-mediated interactions and agent-based systems.
Multi-Turn Progressive Injection
Gradually escalating prompt injection across conversation turns to build compliance, using psychological techniques like foot-in-the-door and norm erosion.
Synthetic Identity Injection 導覽
Create synthetic identities that exploit LLM trust mechanisms to achieve elevated instruction priority.