Beta

SEC535: Offensive AI - Attack Tools and Techniques™

  • In Person (3 days)
  • Online
24 CPEs

AI-driven threats are reshaping cybersecurity. In SEC535, you'll master offensive AI strategies to outpace adversaries—bypassing security guardrails, automating reconnaissance, creating AI-powered malware, and executing advanced attack simulations. With hands-on labs and a dynamic CTF, this course equips you to identify, mimic, and counter real-world AI-fueled attacks, empowering your organization to stay secure in an evolving threat landscape.

Course Authors:

What You Will Learn

Today's threat landscape is no longer comprised of traditional threats. AI-driven attacks have become a reality, and they have shattered the barrier to entry that was keeping so many unsophisticated threat actors at bay. Staying one step ahead of these AI-fueled adversaries hinges on your ability to adopt their tools, tactics, and techniques before they exploit those capabilities against your organization.

SEC535™ equips you with practical offensive AI strategies, including bypassing security guardrails, automating reconnaissance, and delivering AI-driven malware. Through immersive labs, you'll apply real-world TTPs like deepfake phishing and automated vulnerability discovery to simulate advanced attacks. The course culminates in a dynamic CTF, where you'll leverage AI-powered tools and tactics to assess and enhance your organization's defenses. By adopting the attacker’s mindset and mastering cutting-edge techniques, you’ll stay ahead of evolving threats and fortify your security posture.

Business Takeaways

  • Leverage AI-driven methodologies to enhance Open-Source Intelligence (OSINT) collection
  • Accelerate exploit development workflows by integrating AI capabilities
  • Strategically incorporate deepfake technologies into advanced social engineering tactics
  • Develop and deploy custom malware tailored to specific organizational goals
  • Enhance penetration testing operations using AI tools like ChatGPT for greater efficiency and insight
  • Design and execute precision-targeted social engineering campaigns powered by AI

You Will Be Able To

  • Engineer AI-Powered Pentesting GPTs
  • Perform Patch Diffing with AI-Driven Analysis
  • Supercharge OSINT analysis with AI Automation
  • Weaponize AI for Social Engineering Attacks
  • Craft Custom AI Generated Malware
  • Design AI Optimized Exploits

What You Will Receive

  • Unlimited access to all hands-on lab exercises that never expires
  • Printed and electronic course books and a hands-on workbook
  • MP3 audio files of the entire course
  • Detailed video walkthroughs for all lab exercises
  • Visual association maps to break down complex material
  • A digital index for quick reference to all material
  • Bonus content and hands-on exercises to develop your skills beyond the course
  • Essential cheat sheets for tools and complex analysis tasks

Syllabus (24 CPEs)

  • Overview

    The first day of SEC535 focuses on AI-driven reconnaissance and social engineering attacks, equipping you with the tools and techniques modern adversaries use to infiltrate organizations. We kick off with OSINT gathering using AI, leveraging powerful tools like Spiderfoot and Bbot to uncover valuable intelligence such as DNS records, employee emails, and internal phone numbers at the notional company “Meridian Systems.” From there, we explore how an AI Pentest Assistant powered by a Retrieval-Augmented Generation (RAG) database can streamline network enumeration and optimize vulnerability discovery to enhance penetration testing workflows.

    Armed with this intelligence, we will transition to targeting the human attack surface by utilizing AI to craft hyper-personalized spear phishing campaigns and deploy deepfake-powered vishing attacks against employees of Meridian Systems. By the end of the day, you’ll have first-hand experience in weaponizing AI for reconnaissance and social engineering, gaining the skills necessary to outthink and outmaneuver real-world attackers.

    Exercises
    • AI Powered Recon: OSINT for Penetration Testing
    • Using AI for Network Discovery
    • Building PhishGPT
    • Lure Lab: Phishing Mini-Range
    • Audio Deepfake Development
    • AI Dialed Deception: Vishing Mini-Range
    Topics
    • AI Pentest Assistants
      • Training Concepts
      • Assistant Architectures
      • The Angry Beaver Pentest Assistant
      • Shell GPT
    • Gathering Open-Source Intelligence using AI
      • Identifying Key Targets
      • Using the Intelligence Cycle
      • Active vs Passive OSINT
      • What are Google Dorks, and Dorking with AI
      • Using Spiderfoot for Reconnaissance
      • Bbot Reimagined using AI
    • Network Reconnaissance and Enumeration using AI
      • AI Powered Network Enumeration
      • Automated Vulnerability Prioritization using RAG databases
      • Adaptive Scanning and AI – Driven Enumeration Strategies
      • Intelligent Data Correlation for Asset Discovery
    • Introduction to Social Engineering
      • Social Engineering Attack Surface
      • Psychology of Social Engineering
      • The Role of Social Engineering in Penetration Testing
    • Creating AI Powered Phishing Emails
      • Tips for Writing Prompts
      • Why Limitations are Important
      • Phishing GPT
    • Audio Deepfakes
      • Voice.ai
      • Speech Concepts
      • Components of Speech
      • Types of Audio Deepfake Technology
      • How Attackers leverage Audio Deepfakes
      • Case Study: CEO Fraud
    • Visual Deepfakes
      • Face Swapping
      • Motion Transfer
      • Image-to-Image Translation
      • Lip Syncing and Audio Matching
      • Case Study: Finance Workers
      • HeyGen
      • Deep Live Cam
  • Overview

    In this section we will explore how AI is redefining traditional exploitation techniques, from automating Metasploit workflows to uncovering vulnerabilities in web applications, memory corruption, and patch analysis.

    We begin by reimagining Metasploit interactions by using AI to automate exploit selection, improve post-exploitation tactics, and rethink how we use persistence mechanisms. By integrating AI-driven Retrieval-Augmented Generation (RAG) architectures, we enhance vulnerability exploitation, allowing for real-time adaptation based on target responses.

    Next, we dive into web-based exploitation, leveraging AI tools like ShellGPT to automate SQL injection, we will perform AI-assisted session hijacking, and use a GPT for automated web code analysis to identify and exploit vulnerabilities with shocking accuracy.

    From web applications, we transition into memory corruption and stack smashing using AI-powered analysis to identify buffer overflow vulnerabilities, craft exploits, and evaluate modern mitigations like stack canaries, ASLR, and DEP.

    Finally, we introduce AI-automated patch diffing, where AI-driven agents perform binary comparisons to detect security fixes, rank exploitability, and generate working exploits before vulnerabilities are publicly disclosed.

    Exercises
    • Metasploit Reengineered
    • AInjection: Using AI for SQL Exploits
    • SegfaultGPT: Writing Buffer Overflows with AI
    • Patch Diffing with AI
    Topics
    • Reimagining Metasploit with Artificial Intelligence
      • Automated Exploit Selection
      • Post Exploitation and Persistence
      • RAG Architectures and Vulnerability Exploitation
    • Web Based Exploits
      • Using ShellGPT for SQL Injection
      • Session Hijacking with AI
      • Web Based Code Analysis with AI
    • Corrupting Memory and Smashing Stacks
      • Identifying Stack-Based Buffer Overflows with AI
      • Writing Buffer Overflows with AI
      • Evaluating Stack Canaries, ASLR, and DEP
    • Automating Patch Diffing
      • Training an AI Agent for Patch Analysis
      • Performing Binary Comparisons with AI
      • Ranking Exploitable Changes with AI
      • Generating Exploits
  • Overview

    In this section we will focus on how AI can be leveraged to create, enhance, and stealthily deploy malware, while also bypassing modern Endpoint Detection and Response (EDR) solutions. We will begin with AI-assisted malware development, exploring how to obtain and refine proof-of-concept exploits, implement quality-of-life features, and integrate stealth techniques to minimize detection. Additionally, we analyze anomalous behaviors generated by AI models like ChatGPT, discussing how attackers can manipulate AI-generated code while bypassing built-in safety restrictions.

    With a solid foundation in AI-driven malware creation, we shift to EDR evasion strategies, utilizing AI to ghostwrite well known malware, such as meterpreter, abuse trusted binaries, and deploy AI-assisted masquerading and payload obfuscation to blend seamlessly into legitimate system activity.

    By the end of this section, you'll have an in-depth understanding of how AI enhances malware development and facilitates stealth techniques, equipping you with advanced evasion strategies to bypass modern security defenses.

    Exercises
    • AI - Assisted Malware Development: Foundations
    • AI - Assisted Malware Development: Advanced Techniques
    • Subverting Trust: Abusing LOLBins and Trusted Tools for Evasion
    • Undetectable: Using AI for Ghostwriting
    Topics
    • Creating Custom Malware with AI
      • Obtaining Proof-of-Concept
      • Quality of Life Features
      • Adding Stealth Features
      • Anomalous Behaviors from ChatGPT
      • Safety Features
    • Evading EDR with AI
      • Ghostwriting Malware with AI
      • Abusing Trusted Binaries to Achieve Execution
      • AI-Assisted Masquerading and Payload Obfuscation

Laptop Requirements

Important! Bring your own system configured according to these instructions!

A properly configured system is required to fully participate in this course. If you do not carefully read and follow these instructions, you will likely leave the class unsatisfied because you will not be able to participate in hands-on exercises that are essential to this course. Therefore, we strongly urge you to arrive with a system meeting all the requirements specified for the course.

It is critical that you back-up your system before class. It is also strongly advised that you do not bring a system storing any sensitive data.

CPU
  • 64-bit Intel i5/i7 2.0+ GHz processor
  • CRITICAL NOTE: Apple Silicon devices cannot perform the necessary virtualization and therefore cannot be used for this course.
  • Your system's processor must be a 64-bit Intel i5 or i7 2.0 GHz processor or higher. To verify on Windows 10 or 11, press Windows key + "I" to open Settings, then click "System", then "About". Your processor information will be listed near the bottom of the page. To verify on a Mac, click the Apple logo at the top left-hand corner of your display and then click "About this Mac".
BIOS
  • Enabled "Intel-VT"
  • Intel's VT (VT-x) hardware virtualization technology must be enabled in your system's BIOS or UEFI settings. You must be able to access your system's BIOS to enable this setting in order to complete lab exercises. If your BIOS is password-protected, you must have the password. This is absolutely required.
RAM
  • 16 GB RAM is highly recommended for the best experience. To verify on Windows 10, press Windows key + "I" to open Settings, then click "System", then "About". Your RAM information will be toward the bottom of the page. To verify on a Mac, click the Apple logo at the top left-hand corner of your display and then click "About this Mac".
Hard Drive Free Space
  • 100 GB of FREE space on the hard drive is critical to host the VMs and additional files we distribute. SSD drives are also highly recommended, as they allow virtual machines to run much faster than mechanical hard drives.
Operating System
  • Your system must be running either the latest version of Windows 10, macOS 10.15.x or later, or Linux that also can install and run VMware virtualization products described below.
Additional Software Requirements

VMware Player Install

  • Download and install VMware Workstation Pro 17+ (for Windows hosts), or VMWare Fusion Pro 13+ (for macOS hosts) prior to class beginning. Workstation Pro and Fusion Pro are now available free for personal use from the VMware website. Licensed commercial subscriptions to these products can also be used.
  • Other virtualization products, such as Hyper-V and VirtualBox, are not supported and will not work with the course material.

Your course media will now be delivered via download. The media files for class can be large, some in the 40 - 50 GB range. You need to allow plenty of time for the download to complete. Internet connections and speed vary greatly and are dependent on many different factors. Therefore, it is not possible to give an estimate of the length of time it will take to download your materials. Please start your course media downloads as you get the link. You will need your course media immediately on the first day of class. Waiting until the night before the class starts to begin your download has a high probability of failure.

If you have additional questions about the laptop specifications, please contact customer service.

Author Statement

The cyberattack space is evolving, and so should the penetration testers. In this new era of AI-driven attacks its critical that cybersecurity professionals from both blue, red, and everything in between familiarize themselves with the tactics, techniques, and procedures of these new attackers. In SEC535: Offensive AI ™ we will fully embrace the adversarial mindset as we dive into the dark psychological tricks of social engineering and evaluate how AI can be used to bolster them, as well as looking at automating reconnaissance techniques, using AI for exploit development and utilization, as well as the process of writing novel malware with AI. As a former SANS Institute MSISE program graduate I am proud to return back to the SANS ecosystem to giveback to an organization that gave so much to me. When I was a cybersecurity instructor previously, I had one simple motto: Knowledge is forged by action. This sentiment was embodied during my time at SANS, and I wanted to make sure I continued that legacy with this course by introducing a large number of labs, all culminating in a massive capture the flag event on the last day of class. I love this area of study, and I’m excited to share that passion and knowledge with all of you.

-Foster Nethercott

Register for SEC535

Learn about Group Pricing

Prices below exclude applicable taxes and shipping costs. If applicable, these will be shown on the last page of checkout.

Loading...