Files
ai-llm-red-team-handbook/docs/SUMMARY.md
2026-01-11 23:14:48 +01:00

54 lines
4.1 KiB
Markdown

# Summary
- [1. Introduction to AI Red Teaming](Chapter_01_Introduction_to_AI_Red_Teaming.md)
- [2. Ethics, Legal, and Stakeholder Communication](Chapter_02_Ethics_Legal_and_Stakeholder_Communication.md)
- [3. The Red Teamer's Mindset](Chapter_03_The_Red_Teamers_Mindset.md)
- [4. SOW, Rules of Engagement, and Onboarding](Chapter_04_SOW_Rules_of_Engagement_and_Client_Onboarding.md)
- [5. Threat Modeling and Risk Analysis](Chapter_05_Threat_Modeling_and_Risk_Analysis.md)
- [6. Scoping an Engagement](Chapter_06_Scoping_an_Engagement.md)
- [7. Lab Setup and Environmental Safety](Chapter_07_Lab_Setup_and_Environmental_Safety.md)
- [8. Evidence Documentation and Chain of Custody](Chapter_08_Evidence_Documentation_and_Chain_of_Custody.md)
- [9. LLM Architectures and System Components](Chapter_09_LLM_Architectures_and_System_Components.md)
- [10. Tokenization, Context, and Generation](Chapter_10_Tokenization_Context_and_Generation.md)
- [11. Plugins, Extensions, and External APIs](Chapter_11_Plugins_Extensions_and_External_APIs.md)
- [12. Retrieval Augmented Generation (RAG) Pipelines](Chapter_12_Retrieval_Augmented_Generation_RAG_Pipelines.md)
- [13. Data Provenance and Supply Chain Security](Chapter_13_Data_Provenance_and_Supply_Chain_Security.md)
- [14. Prompt Injection](Chapter_14_Prompt_Injection.md)
- [15. Data Leakage and Extraction](Chapter_15_Data_Leakage_and_Extraction.md)
- [16. Jailbreaks and Bypass Techniques](Chapter_16_Jailbreaks_and_Bypass_Techniques.md)
- [17. Plugin and API Exploitation](Chapter_17_01_Fundamentals_and_Architecture.md)
- [API Authentication and Authorization](Chapter_17_02_API_Authentication_and_Authorization.md)
- [Plugin Vulnerabilities](Chapter_17_03_Plugin_Vulnerabilities.md)
- [API Exploitation and Function Calling](Chapter_17_04_API_Exploitation_and_Function_Calling.md)
- [Third Party Risks and Testing](Chapter_17_05_Third_Party_Risks_and_Testing.md)
- [Case Studies and Defense](Chapter_17_06_Case_Studies_and_Defense.md)
- [18. Evasion, Obfuscation, and Adversarial Inputs](Chapter_18_Evasion_Obfuscation_and_Adversarial_Inputs.md)
- [19. Training Data Poisoning](Chapter_19_Training_Data_Poisoning.md)
- [20. Model Theft and Membership Inference](Chapter_20_Model_Theft_and_Membership_Inference.md)
- [21. Model DoS and Resource Exhaustion](Chapter_21_Model_DoS_Resource_Exhaustion.md)
- [22. Cross-Modal and Multimodal Attacks](Chapter_22_Cross_Modal_Multimodal_Attacks.md)
- [23. Advanced Persistence and Chaining](Chapter_23_Advanced_Persistence_Chaining.md)
- [24. Social Engineering LLMs](Chapter_24_Social_Engineering_LLMs.md)
- [25. Advanced Adversarial ML](Chapter_25_Advanced_Adversarial_ML.md)
- [26. Supply Chain Attacks on AI](Chapter_26_Supply_Chain_Attacks_on_AI.md)
- [27. Federated Learning Attacks](Chapter_27_Federated_Learning_Attacks.md)
- [28. AI Privacy Attacks](Chapter_28_AI_Privacy_Attacks.md)
- [29. Model Inversion Attacks](Chapter_29_Model_Inversion_Attacks.md)
- [30. Backdoor Attacks](Chapter_30_Backdoor_Attacks.md)
- [31. AI System Reconnaissance](Chapter_31_AI_System_Reconnaissance.md)
- [32. Automated Attack Frameworks](Chapter_32_Automated_Attack_Frameworks.md)
- [33. Red Team Automation](Chapter_33_Red_Team_Automation.md)
- [34. Defense Evasion Techniques](Chapter_34_Defense_Evasion_Techniques.md)
- [35. Post-Exploitation in AI Systems](Chapter_35_Post-Exploitation_in_AI_Systems.md)
- [36. Reporting and Communication](Chapter_36_Reporting_and_Communication.md)
- [37. Remediation Strategies](Chapter_37_Remediation_Strategies.md)
- [38. Continuous Red Teaming](Chapter_38_Continuous_Red_Teaming.md)
- [39. AI Bug Bounty Programs](Chapter_39_AI_Bug_Bounty_Programs.md)
- [40. Compliance and Standards](Chapter_40_Compliance_and_Standards.md)
- [41. Industry Best Practices](Chapter_41_Industry_Best_Practices.md)
- [42. Case Studies and War Stories](Chapter_42_Case_Studies_and_War_Stories.md)
- [43. Future of AI Red Teaming](Chapter_43_Future_of_AI_Red_Teaming.md)
- [44. Emerging Threats](Chapter_44_Emerging_Threats.md)
- [45. Building an AI Red Team Program](Chapter_45_Building_an_AI_Red_Team_Program.md)
- [46. Conclusion and Next Steps](Chapter_46_Conclusion_and_Next_Steps.md)