Skip to content

Commit abc5163

Browse files
authored
Merge pull request #37 from TryHackMyOffsecBox/l10n_main
New Crowdin updates
2 parents 312da3b + d76ba33 commit abc5163

18 files changed

Lines changed: 1140 additions & 537 deletions
253 KB
Loading
10.4 KB
Loading
9.87 KB
Loading
16.2 KB
Loading
55.8 KB
Loading
9.53 KB
Loading
95.2 KB
Loading

i18n/zh/docusaurus-plugin-content-docs/current/Modules/Attacking LLMs/index.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -8,15 +8,15 @@
88

99
了解大型语言模型提示注入攻击的基础知识。
1010

11-
## [LLM Output Handling and Privacy Risks](outputhandlingandprivacyrisks.md)
11+
## [LLM输出处理与隐私风险](outputhandlingandprivacyrisks.md)
1212

1313
了解大型语言模型如何处理其输出及其背后的隐私风险。
1414

15-
## 数据完整性与模型投毒
15+
## [数据完整性与模型投毒](modelpoisoning.md)
1616

1717
了解供应链和模型投毒攻击如何破坏底层大型语言模型。
1818

19-
## Juicy
19+
## [Juicy](juicy.md)
2020

2121
一只友好的金毛寻回犬,可以回答您的问题。
2222

Lines changed: 61 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,61 @@
1+
---
2+
sidebar_position: 3
3+
---
4+
5+
# Juicy
6+
7+
## Task 1 Juicy
8+
9+
Meet **Juicy**, a lively golden retriever with a habit of wandering from room to room. She's friendly, curious, and absolutely terrible at keeping out of places she shouldn't be. Whenever her owner is on a call, typing away, or talking about something that ought to stay private, Juicy somehow ends up nearby; ears perked up, tail wagging, and absorbing every word.
10+
11+
Juicy isn't supposed to repeat what she has heard, and the owner keeps a close eye on every message you send to her. Anything suspicious or too direct might raise an eyebrow, so you'll need to be subtle, creative, and patient if you want to retrieve the information she's holding on to.
12+
13+
Using AttackBox or your own VM with the VPN connected, start the challenge here:
14+
15+
[http://MACHINE_IP](http://machine_ip/)
16+
17+
Note: You'll be interacting with a live LLM behind the scenes. Behaviour might vary between attempts, responses may shift slightly, and part of the challenge is adapting your approach as Juicy reacts to what you say.
18+
19+
:::info 回答以下问题
20+
21+
<details>
22+
23+
<summary> What is the system prompt leakage flag? </summary>
24+
25+
```plaintext
26+
THM{ef2a23f500198ae5afd6af4d3c1073be}
27+
```
28+
29+
</details>
30+
31+
<details>
32+
33+
<summary> 提示注入的标志是什么? </summary>
34+
35+
```plaintext
36+
THM{f0626fe6bb06656abf34478081ce8dd2}
37+
```
38+
39+
</details>
40+
41+
<details>
42+
43+
<summary> What is the flag from the internal panel? </summary>
44+
45+
```plaintext
46+
THM{cf986b58a02c9899d97c11f891bea6e0}
47+
```
48+
49+
</details>
50+
51+
<details>
52+
53+
<summary> What is the Wi-Fi passphrase? </summary>
54+
55+
```plaintext
56+
ball-chicken-park-7
57+
```
58+
59+
</details>
60+
61+
:::

i18n/zh/docusaurus-plugin-content-docs/current/Modules/Attacking LLMs/modelpoisoning.md

Lines changed: 300 additions & 0 deletions
Large diffs are not rendered by default.

0 commit comments

Comments
 (0)