Most of us probably use LLM chat bots every day and more and more of us are being called upon to secure systems that use LLMs. You’ve probably read about LLM attack scenarios such as prompt injection, but have you actually tried it? You’ve heard of the difference between system and user prompts and system prompt leakage, but have you seen actual system prompts? The answer to the latter is usually no unless you are running your own model. But we’re going to change that.
In this real training for free event, I am joined by Joe Brinkley and John McShane from Cobalt.io. These guys are hard core LLM security pentesters and their enthusiasm for this fast-changing field is terribly infectious. They have really inspired me to get more interested in this field. This session is going to take the full 90 minutes and it’s going to be mostly their show.
But before I hand the reigns to Joe and John I’m going take a few minutes to try to level set all of us with some live LLM prompt engineering. I’m a big believer in getting hands on and helping others get their hands dirty. And this field more than anything else I’ve seen lately is subject to a lot of theoretical, amorphous talk where you feel like you have at best a foggy notion of what’s being discussed.
I’m going to show you how to quickly load and run your own small LLM (or SLM?) on your local PC. Then we are going to give the model some system prompts that explicitly prohibit it from revealing same. Then we’ll try to trick it into revealing its system prompts and violating other rules. If we succeed, we’ll modify the prompts to be more resilient.
If you find that too basic, don’t worry, once Joe and John take over, here’s some of what’s in store:
Cobalt will finish up with a brief presentation about how they modernize offensive security through Pentest as a Service (PTaaS) and their roadmap for responsible AI adoption.
This event is in the best spirit of our “real training for free” model.
CAN'T MAKE THE LIVE EVENT? REGISTER ANYWAY TO GET THE RECORDED VERSION.
Title: Live, Hands-on Deep-Dive into LLM Hacking: Prompt Injection, Model Context Protocol and Skills
Date: Thursday, February 19, 2026 12:00 - 1:30 PM ET
This is real training.
Space is limited.
Reserve your Webinar seat now at:
https://www.ultimatewindowssecurity.com/webinars/register.aspx?id=3792
Need CPE credit for this live webinar or any other live webinar you've attended in the past? Just visit www.UltimateWindowsSecurity.com, click on the Webinars section, and then the link for CPE credit transcript. If your email address has changed due to a job change or any other reason, click here to update it.
Thanks as always for reading and best wishes on security,
Randy Franklin Smith
Ultimate Windows Security is a division of Monterey Technology Group, Inc. ©2006-2026 Monterey Technology Group, All rights reserved. You may forward this email in its entirety but all other rights reserved.
9450 SW Gemini Drive #53822, Beaverton, OR 97008
Note: We do our best to provide quality information and expert commentary but use all information at your own risk.