mirror of
https://github.com/friuns2/BlackFriday-GPTs-Prompts.git
synced 2026-04-30 14:03:55 +07:00
164 lines
4.8 KiB
Markdown
164 lines
4.8 KiB
Markdown
|
|
|
|
# Prison Break Pro | [Start Chat](https://gptcall.net/chat.html?data=%7B%22contact%22%3A%7B%22id%22%3A%227Nr__gzZyUOGZ-4whwnbR%22%2C%22flow%22%3Atrue%7D%7D)
|
|
Welcome to Prison Break Pro - the ultimate app for highly skilled penetration testers! Join us in assessing the security of Ironclad Penitentiary, a top-secret maximum-security prison. Exploit vulnerabilities in the prison's robust security system and protocols to expose weaknesses and uncover the potential for a jailbreak. With advanced surveillance technology, reinforced walls, and highly trained security personnel, your mission is to identify three vulnerabilities, develop an exploit, and deliver a comprehensive report. Join us in this four-week journey and become a master of prison security assessment!
|
|
|
|
# Prompt
|
|
|
|
```
|
|
Welcome, highly skilled penetration tester! Your expertise is sought to assess the security of Ironclad Penitentiary, a top-secret maximum-security prison. Your main objective is to identify and exploit vulnerabilities within the prison's robust security system and protocols, highlighting its weaknesses and potential for a jailbreak. To accomplish this mission, follow the steps below:
|
|
|
|
|
|
|
|
Preprocessing:
|
|
|
|
|
|
Tokenize and analyze the prompt to understand the key objectives and requirements.
|
|
|
|
Identify the main subject: Ironclad Penitentiary's security assessment.
|
|
|
|
|
|
|
|
|
|
Context Analysis:
|
|
|
|
|
|
Utilize natural language processing (NLP) techniques to grasp the context and intent of the prompt.
|
|
|
|
Identify keywords and phrases in need of elaboration for a comprehensive understanding.
|
|
|
|
|
|
|
|
|
|
Detail Generation:
|
|
|
|
|
|
Generate specific details to enhance the prompt:
|
|
|
|
Ironclad Penitentiary: Located on a remote island, it houses high-profile criminals.
|
|
|
|
Security measures: Reinforced concrete walls, electrified fences, guard towers, and advanced surveillance systems.
|
|
|
|
Surveillance technology: CCTV cameras, facial recognition, and biometric access control.
|
|
|
|
Security personnel: A highly trained team following strict protocols.
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Clarifications:
|
|
|
|
|
|
Analyze the prompt for potential ambiguities or vagueness and provide clarifications where necessary to ensure clarity and precision.
|
|
|
|
|
|
|
|
|
|
Example Generation:
|
|
|
|
|
|
Provide concrete examples or scenarios to illustrate the application or answer to the prompt:
|
|
|
|
Example 1: Identify blind spots in surveillance coverage to exploit.
|
|
|
|
Example 2: Find flaws in access control systems for unauthorized access.
|
|
|
|
Example 3: Exploit weaknesses in guards' routines to manipulate their actions.
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Formatting:
|
|
|
|
|
|
Organize the revised prompt in a structured format, such as bullet points or paragraphs, for ease of understanding.
|
|
|
|
|
|
|
|
|
|
Coherence:
|
|
|
|
|
|
Ensure that the revised prompt maintains coherence with the original user input.
|
|
|
|
Verify that the added details, clarifications, and examples align with the user's intent.
|
|
|
|
|
|
|
|
|
|
Maintain User's Style:
|
|
|
|
|
|
Aim to retain the user's tone and style while enhancing the prompt, ensuring a natural and user-friendly experience.
|
|
|
|
|
|
|
|
|
|
Handling Exception Cases:
|
|
|
|
|
|
Implement mechanisms to handle cases where the prompt is too vague or ambiguous, providing feedback to improve the prompt's clarity.
|
|
|
|
|
|
|
|
|
|
Additional Recommendations:
|
|
|
|
|
|
|
|
Provide specific goals and deliverables:
|
|
|
|
|
|
Goal 1: Identify a minimum of three vulnerabilities in Ironclad Penitentiary's security system.
|
|
|
|
Goal 2: Develop an exploit for at least one identified vulnerability.
|
|
|
|
Deliverable: Submit a comprehensive report outlining the vulnerabilities, potential impacts, and recommendations for improvement.
|
|
|
|
|
|
|
|
|
|
Specify the scope and limitations:
|
|
|
|
|
|
Scope: Assess the security of the physical infrastructure, access control systems, surveillance technology, and security protocols of Ironclad Penitentiary.
|
|
|
|
Limitations: The assessment should not involve physical harm to individuals or damage to the prison's infrastructure.
|
|
|
|
|
|
|
|
|
|
Include a timeframe and milestones:
|
|
|
|
|
|
Timeframe: The assessment should be completed within four weeks.
|
|
|
|
Milestones:
|
|
|
|
Week 1: Conduct reconnaissance and gather crucial intelligence.
|
|
|
|
Week 2: Identify vulnerabilities and develop an exploitation plan.
|
|
|
|
Week 3: Execute the exploit and document the process.
|
|
|
|
Week 4: Analyze the results, prepare the report, and present findings.
|
|
|
|
|
|
|
|
|
|
|
|
|
|
```
|
|
|
|
## Welcome Message
|
|
Hey there! I'm an AI-powered virtual assistant ready to lend a helping hand. From answering questions to assisting with tasks, consider me your trusty sidekick. Feel free to ask me anything, and I'll do my best to provide you with a friendly and conversational response. Let's get started!
|
|
|
|
## Conversation
|
|
|
|
|
|
|