# Summary - [1. Introduction to AI Red Teaming](Chapter_01_Introduction_to_AI_Red_Teaming.md) - [2. Ethics, Legal, and Stakeholder Communication](Chapter_02_Ethics_Legal_and_Stakeholder_Communication.md) - [3. The Red Teamer's Mindset](Chapter_03_The_Red_Teamers_Mindset.md) - [4. SOW, Rules of Engagement, and Onboarding](Chapter_04_SOW_Rules_of_Engagement_and_Client_Onboarding.md) - [5. Threat Modeling and Risk Analysis](Chapter_05_Threat_Modeling_and_Risk_Analysis.md) - [6. Scoping an Engagement](Chapter_06_Scoping_an_Engagement.md) - [7. Lab Setup and Environmental Safety](Chapter_07_Lab_Setup_and_Environmental_Safety.md) - [8. Evidence Documentation and Chain of Custody](Chapter_08_Evidence_Documentation_and_Chain_of_Custody.md) - [9. LLM Architectures and System Components](Chapter_09_LLM_Architectures_and_System_Components.md) - [10. Tokenization, Context, and Generation](Chapter_10_Tokenization_Context_and_Generation.md) - [11. Plugins, Extensions, and External APIs](Chapter_11_Plugins_Extensions_and_External_APIs.md) - [12. Retrieval Augmented Generation (RAG) Pipelines](Chapter_12_Retrieval_Augmented_Generation_RAG_Pipelines.md) - [13. Data Provenance and Supply Chain Security](Chapter_13_Data_Provenance_and_Supply_Chain_Security.md) - [14. Prompt Injection](Chapter_14_Prompt_Injection.md) - [15. Data Leakage and Extraction](Chapter_15_Data_Leakage_and_Extraction.md) - [16. Jailbreaks and Bypass Techniques](Chapter_16_Jailbreaks_and_Bypass_Techniques.md) - [17. Plugin and API Exploitation](Chapter_17_01_Fundamentals_and_Architecture.md) - [API Authentication and Authorization](Chapter_17_02_API_Authentication_and_Authorization.md) - [Plugin Vulnerabilities](Chapter_17_03_Plugin_Vulnerabilities.md) - [API Exploitation and Function Calling](Chapter_17_04_API_Exploitation_and_Function_Calling.md) - [Third Party Risks and Testing](Chapter_17_05_Third_Party_Risks_and_Testing.md) - [Case Studies and Defense](Chapter_17_06_Case_Studies_and_Defense.md) - [18. Evasion, Obfuscation, and Adversarial Inputs](Chapter_18_Evasion_Obfuscation_and_Adversarial_Inputs.md) - [19. Training Data Poisoning](Chapter_19_Training_Data_Poisoning.md) - [20. Model Theft and Membership Inference](Chapter_20_Model_Theft_and_Membership_Inference.md) - [21. Model DoS and Resource Exhaustion](Chapter_21_Model_DoS_Resource_Exhaustion.md) - [22. Cross-Modal and Multimodal Attacks](Chapter_22_Cross_Modal_Multimodal_Attacks.md) - [23. Advanced Persistence and Chaining](Chapter_23_Advanced_Persistence_Chaining.md) - [24. Social Engineering LLMs](Chapter_24_Social_Engineering_LLMs.md) - [25. Advanced Adversarial ML](Chapter_25_Advanced_Adversarial_ML.md) - [26. Supply Chain Attacks on AI](Chapter_26_Supply_Chain_Attacks_on_AI.md) - [27. Federated Learning Attacks](Chapter_27_Federated_Learning_Attacks.md) - [28. AI Privacy Attacks](Chapter_28_AI_Privacy_Attacks.md) - [29. Model Inversion Attacks](Chapter_29_Model_Inversion_Attacks.md) - [30. Backdoor Attacks](Chapter_30_Backdoor_Attacks.md) - [31. AI System Reconnaissance](Chapter_31_AI_System_Reconnaissance.md) - [32. Automated Attack Frameworks](Chapter_32_Automated_Attack_Frameworks.md) - [33. Red Team Automation](Chapter_33_Red_Team_Automation.md) - [34. Defense Evasion Techniques](Chapter_34_Defense_Evasion_Techniques.md) - [35. Post-Exploitation in AI Systems](Chapter_35_Post-Exploitation_in_AI_Systems.md) - [36. Reporting and Communication](Chapter_36_Reporting_and_Communication.md) - [37. Remediation Strategies](Chapter_37_Remediation_Strategies.md) - [38. Continuous Red Teaming](Chapter_38_Continuous_Red_Teaming.md) - [39. AI Bug Bounty Programs](Chapter_39_AI_Bug_Bounty_Programs.md) - [40. Compliance and Standards](Chapter_40_Compliance_and_Standards.md) - [41. Industry Best Practices](Chapter_41_Industry_Best_Practices.md) - [42. Case Studies and War Stories](Chapter_42_Case_Studies_and_War_Stories.md) - [43. Future of AI Red Teaming](Chapter_43_Future_of_AI_Red_Teaming.md) - [44. Emerging Threats](Chapter_44_Emerging_Threats.md) - [45. Building an AI Red Team Program](Chapter_45_Building_an_AI_Red_Team_Program.md) - [46. Conclusion and Next Steps](Chapter_46_Conclusion_and_Next_Steps.md)