It is true that with AI agents and its accessibility, we have equipped the malicious actor with slightly more automating power in its arsenal.
However, like fuzzers, they only increase the speed at which they find vulnerabilities.
AI agents will make it easier to vulnerability scan multiple endpoints very fast. However, human beings still need to think, interpret and correlate data to establish vulnerability chains that lead to exploitation.
At Michaelis Labs, we have tried two tools being marketed and sold as a great end-to-end pentesting solution on Hackthebox Active Directory Windows boxes. (ADScan & Penligent)
AI agents does speed up some part of reconnaisance and vulnerability scanning but they fail at some pivots, they often can’t exploit domain trust and they can’t use a different enumeration technique if one fails via a protocol.
More importantly, Deepseek & ChatGPT still can’t understand documentation and incorrectly provide commands without the correct flags to undertake enumeration.
In conclusion, relying solely on its output is a huge mistake and money thrown in the trash.
There are other ways besides an AI penetration test you can use to secure your internal environment with proven effectiveness and less risk to your data.
Buying a fully autonomous, continuous, AI agent to penetration test your environment is a flashy gadget being marketed everywhere with no real return on investment.
The narrative that we need AI to secure our network, to find and exploit vulnerabilities in our network is being encouraged, using fear, to get companies to fall for a fake piece of insurance.
It’s a dangerous and misleading trend that has now reached the Mauritius market.
Funding is being raised right now in the US and UK to market AI pentesting solutions aggressively.
New entrepreneurs with no background in cybersecurity have hit the Mauritian market selling AI pentesting tools.
Ask yourself what will happen to your network and data when unknown AI agents owned by unknown persons have access to it 24/7?
bash -c "java -Xms10m -Xmx200m -XX:GCTimeRatio=19 -jar /usr/local/collaborator/burpsuite_pro_1.7.33.jar --collaborator-server --collaborator-config=/usr/local/collaborator/collaborator.config"
2018-04-08 19:46:36.082 : Using configuration file /usr/local/collaborator/collaborator.config
2018-04-08 19:46:37.473 : Listening for DNS on 54.38.**.**:3353
2018-04-08 19:46:37.486 : Listening for HTTP on 54.38.**.**:39090
2018-04-08 19:46:37.486 : Listening for SMTP on 54.38.**.**:3325
2018-04-08 19:46:37.487 : Listening for HTTP on 54.38.**.**:3380
2018-04-08 19:46:37.486 : Listening for SMTP on 54.38.**.**:33587
2018-04-08 19:46:37.600 : Listening for SMTPS on 54.38.**.**:33465
2018-04-08 19:46:37.600 : Listening for HTTPS on 54.38.**.**:39443
2018-04-08 19:46:37.602 : Listening for HTTPS on 54.38.**.**:33443This guide will show you what DNS records to put on GoDaddy. I have tried Namecheap but with no success.
Ctrl + C.
Create the DNS records, here is what was used on GoDaddy:
+-----------+---------------------------+----------------------------+
| type | name | data |
+-----------+--------------------+-----------------------------------+
| A | subdomain | DROPLET IP |
| A | ns1.subdomain | DROPLET IP |
| NS | subdomain | ns1.subdomain.domain.com |
| TXT | _acme-challenge.subdomain | XXXXXXXXXXXXXXXXXXXX |
| TXT | _acme-challenge.subdomain | XXXXXXXXXXXXXXXXXXXX |
+-----------+--------------------+-----------------------------------+
Once done, you can re-run the Collaborator but as a service for persistence.
# Configures the time to wait before service is stopped forcefully.
TimeoutStopSec=300
[Install]
WantedBy=multi-user.target
Enable the service:
systemctl enable collaborator
Finally, start the service:
systemctl start collaborator
Also, note if you mess up the config file, do stop, disable, and re-enable the service for the new config file to take effect.
Once the DNS records are UP, and the service is running:
systemctl status collaborator
Check with the DIG requests that the nameserver resolution is working with these:
dig subdomain.domain.com NS @8.8.8.8
dig ns1.subdomain.domain.com A @8.8.8.8 +trace
If you don’t see your DROPLET IP responding to the last dig, then the DNS collaborator service might be incorrectly setup, check your collaborator.config and disable/enable/start the collaborator service.
Once it responds, go to Burp > Settings > User or Burp > Settings > Project and modify the Collaborator section to Use a private collaborator server, entering your subdomain.domain.com you have chosen.