<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://lms.onnocenter.or.id/wiki/index.php?action=history&amp;feed=atom&amp;title=Cyber_Security%3A_AI_based</id>
	<title>Cyber Security: AI based - Revision history</title>
	<link rel="self" type="application/atom+xml" href="https://lms.onnocenter.or.id/wiki/index.php?action=history&amp;feed=atom&amp;title=Cyber_Security%3A_AI_based"/>
	<link rel="alternate" type="text/html" href="https://lms.onnocenter.or.id/wiki/index.php?title=Cyber_Security:_AI_based&amp;action=history"/>
	<updated>2026-04-20T12:02:59Z</updated>
	<subtitle>Revision history for this page on the wiki</subtitle>
	<generator>MediaWiki 1.45.1</generator>
	<entry>
		<id>https://lms.onnocenter.or.id/wiki/index.php?title=Cyber_Security:_AI_based&amp;diff=72590&amp;oldid=prev</id>
		<title>Unknown user: /* Pranala Menarik */</title>
		<link rel="alternate" type="text/html" href="https://lms.onnocenter.or.id/wiki/index.php?title=Cyber_Security:_AI_based&amp;diff=72590&amp;oldid=prev"/>
		<updated>2025-04-21T03:22:42Z</updated>

		<summary type="html">&lt;p&gt;&lt;span class=&quot;autocomment&quot;&gt;Pranala Menarik&lt;/span&gt;&lt;/p&gt;
&lt;table style=&quot;background-color: #fff; color: #202122;&quot; data-mw=&quot;interface&quot;&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;tr class=&quot;diff-title&quot; lang=&quot;en&quot;&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;← Older revision&lt;/td&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;Revision as of 03:22, 21 April 2025&lt;/td&gt;
				&lt;/tr&gt;&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot; id=&quot;mw-diff-left-l61&quot;&gt;Line 61:&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 61:&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;==Pranala Menarik==&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;==Pranala Menarik==&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;−&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;* [[&lt;del style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;Database: Kuliah&lt;/del&gt;]]&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;* [[&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;Cyber Security&lt;/ins&gt;]]&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;/table&gt;</summary>
		<author><name>Unknown user</name></author>
	</entry>
	<entry>
		<id>https://lms.onnocenter.or.id/wiki/index.php?title=Cyber_Security:_AI_based&amp;diff=72588&amp;oldid=prev</id>
		<title>Unknown user: Created page with &quot;==Overview: AI &amp; ChatGPT for Hacking and Pentesting==  {| class=&quot;wikitable&quot; ! Area !! Tools / Techniques !! How AI Helps |- | &#039;&#039;&#039;Reconnaissance&#039;&#039;&#039; || `Recon-ng`, `Amass`, `Sho...&quot;</title>
		<link rel="alternate" type="text/html" href="https://lms.onnocenter.or.id/wiki/index.php?title=Cyber_Security:_AI_based&amp;diff=72588&amp;oldid=prev"/>
		<updated>2025-04-21T02:49:16Z</updated>

		<summary type="html">&lt;p&gt;Created page with &amp;quot;==Overview: AI &amp;amp; ChatGPT for Hacking and Pentesting==  {| class=&amp;quot;wikitable&amp;quot; ! Area !! Tools / Techniques !! How AI Helps |- | &amp;#039;&amp;#039;&amp;#039;Reconnaissance&amp;#039;&amp;#039;&amp;#039; || `Recon-ng`, `Amass`, `Sho...&amp;quot;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;==Overview: AI &amp;amp; ChatGPT for Hacking and Pentesting==&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
! Area !! Tools / Techniques !! How AI Helps&lt;br /&gt;
|-&lt;br /&gt;
| &amp;#039;&amp;#039;&amp;#039;Reconnaissance&amp;#039;&amp;#039;&amp;#039; || `Recon-ng`, `Amass`, `Shodan`, `Maltego` || Automating OSINT data collection, domain enumeration&lt;br /&gt;
|-&lt;br /&gt;
| &amp;#039;&amp;#039;&amp;#039;Vulnerability Scanning&amp;#039;&amp;#039;&amp;#039; || `Nessus`, `OpenVAS`, `Nuclei` || AI can prioritize high-risk findings, summarize reports&lt;br /&gt;
|-&lt;br /&gt;
| &amp;#039;&amp;#039;&amp;#039;Exploitation&amp;#039;&amp;#039;&amp;#039; || `Metasploit`, `SQLMap`, `Hydra` || AI/LLMs like ChatGPT can help write or adjust exploit payloads&lt;br /&gt;
|-&lt;br /&gt;
| &amp;#039;&amp;#039;&amp;#039;Post-Exploitation&amp;#039;&amp;#039;&amp;#039; || `Empire`, `Covenant` || AI can help automate lateral movement scripts or report generation&lt;br /&gt;
|-&lt;br /&gt;
| &amp;#039;&amp;#039;&amp;#039;AI-Assisted Automation&amp;#039;&amp;#039;&amp;#039; || GPT + Python/Shell scripting || ChatGPT can generate scripts for scanning, brute-force, privilege escalation&lt;br /&gt;
|-&lt;br /&gt;
| &amp;#039;&amp;#039;&amp;#039;Learning / CTF&amp;#039;&amp;#039;&amp;#039; || HackTheBox, TryHackMe, OverTheWire || ChatGPT can act like a tutor, helping explain and solve challenges&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==AI Tools Built for Pentesting==&lt;br /&gt;
&lt;br /&gt;
1. &amp;#039;&amp;#039;&amp;#039;AutoGPT for Pentesting&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
*  Custom agents that automate reconnaissance, scanning, and even suggest exploits.&lt;br /&gt;
*  Can use plugins for tools like Nmap or Shodan.&lt;br /&gt;
*  Risky if misused — always test in safe environments.&lt;br /&gt;
&lt;br /&gt;
2. &amp;#039;&amp;#039;&amp;#039;PentestGPT&amp;#039;&amp;#039;&amp;#039; (open-source)&lt;br /&gt;
*  A tool combining GPT with structured pentest logic.&lt;br /&gt;
*  Helps automate report generation and logic for attacks.&lt;br /&gt;
*  GitHub: [https://github.com/GreyDGL/PentestGPT](https://github.com/GreyDGL/PentestGPT)&lt;br /&gt;
&lt;br /&gt;
3. &amp;#039;&amp;#039;&amp;#039;ChatGPT for Red Teaming&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
*  Used to generate phishing emails, fake payloads, obfuscated scripts, etc.&lt;br /&gt;
*  Can be used for awareness and testing employee response in simulations.&lt;br /&gt;
&lt;br /&gt;
4. &amp;#039;&amp;#039;&amp;#039;Prompt-Engineered Tools&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
*  For example, using ChatGPT to:&lt;br /&gt;
**  Generate `nmap` or `burp suite` filters&lt;br /&gt;
**  Modify shellcode for evasion&lt;br /&gt;
**  Write C2 implants or exfil scripts&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Legal &amp;amp; Ethical Use==&lt;br /&gt;
&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;Only use on systems you have explicit permission to test.&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
* Perfect for academic labs, simulations, or thesis projects on AI in cybersecurity.&lt;br /&gt;
* Using AI to hack real systems without consent = &amp;#039;&amp;#039;&amp;#039;illegal&amp;#039;&amp;#039;&amp;#039;.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Educational Use Cases==&lt;br /&gt;
&lt;br /&gt;
1. &amp;#039;&amp;#039;&amp;#039;Thesis Topic Ideas&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
* &amp;quot;Using LLMs to Automate Web Pentesting Reconnaissance&amp;quot;&lt;br /&gt;
* &amp;quot;Evaluation of AI Agents for Vulnerability Management in Enterprise Systems&amp;quot;&lt;br /&gt;
* &amp;quot;Ethical Implications of AI-Augmented Hacking&amp;quot;&lt;br /&gt;
&lt;br /&gt;
2. &amp;#039;&amp;#039;&amp;#039;Lab Ideas&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
* Build a GPT-powered assistant that recommends attack paths in a simulated lab.&lt;br /&gt;
* Combine GPT with tools like `Nmap + Nikto + Metasploit` and summarize the steps.&lt;br /&gt;
&lt;br /&gt;
==Pranala Menarik==&lt;br /&gt;
&lt;br /&gt;
* [[Database: Kuliah]]&lt;/div&gt;</summary>
		<author><name>Unknown user</name></author>
	</entry>
</feed>