AI-First Pentest Mindset
Fully AI-Assisted- Role of AI in penetration testing (capabilities vs limitations)
- Overview of LLM tools — GPT, Claude, Ollama
- Prompt engineering for security workflows
- Using AI for troubleshooting and productivity
Foundations & AI-Assisted Lab Architecture
Orientation & Professional Ethics
- Legal boundaries & responsible disclosure
- Rules of engagement
- NDA awareness & professional conduct
Secure Lab Setup & Environment Design
- Virtualization — VMs, WSL concepts
- Kali Linux & Windows lab setup
Operating System Mastery
- User & privilege management
- File system
- File permissions — chmod, chown
- Service management — systemctl
- SSH configuration
AI-Assisted Core Technical Foundation
Networking Deep Dive
- IPs and Protocols
- OSI vs TCP/IP models
- Subnetting fundamentals
- Ports & services
- Firewall basics
- Packet capture fundamentals
- Packet sniffing
- Manual socket-based port scanner
Lab Installations
- DVWA Lab Setup
- Metasploitable2 Lab Setup
- Customized SaaS Product Lab Setup
Python for Offensive Security
- Virtual environments
- Requests & API handling
- Socket programming
- Regex & parsing
- JSON handling
AI-Assisted Reconnaissance & Enumeration
Reconnaissance Engineering
- Passive vs active recon
- OSINT fundamentals
- Google dorking
- Structured recon on target domain
- Attack surface mapping — Bank lab
Scanning & Enumeration
- Service enumeration
- SMB & FTP basics
- Directory brute forcing
- Vulnerability scanning concepts
AI-Assisted Web & API Security
Web Fundamentals
- HTTP methods & headers
- Cookies & session management
- Authentication vs authorization
- JWT basics
OWASP Top 10 — Hands-on
- DVWA exploitation
- Custom bank lab
API Security Testing
- REST API fundamentals
- Token handling
- Broken Object Level Authorization (BOLA)
- API fuzzing basics
- Python-based API interaction
- Testing scripts
AI-Assisted SaaS Security Testing
IDOR testing in SaaS environments
Server-Side Request Forgery via webhooks
Finding exposed administration interfaces
Identifying and exploiting dangling DNS records
Locating and exploiting exposed credentials
Multi-tenant access control bypass testing
AI-Assisted Exploitation & Post-Exploitation
Exploitation Techniques
- Metasploit basics
- Manual vs automated exploitation
- Reverse shells
- Payload fundamentals
- Metasploitable exploitation walkthrough
Post-Exploitation
- Privilege escalation basics
- Password hash concepts
- John the Ripper basics
- SSH key handling
- Persistence overview
AI-Assisted Cryptography & Password Security
Cryptography & Password Security
- Hashing vs encryption
- MD5, SHA families
- Salting techniques
- Symmetric vs asymmetric encryption
- RSA fundamentals
- SSH key generation
- Python cryptography
AI-Driven Reporting & Bug Bounty Workflow
Vulnerability Reporting
- Report structure
- Risk rating basics
- Writing Proof of Concept (PoC)
- Screenshot discipline
- Writing remediation steps
AI-Powered Custom Tooling
- Build custom recon tools
- Automation scripts
- API integrations
Final Capstone Tracks
Bug Bounty Simulation
- Full reconnaissance
- Web & API exploitation
- Report submission
Offensive Automation
- Build recon tools
- API modules
- Scanner automation
Web Security Audit
- Full audit of lab
- Identify vulnerabilities
- Deliver structured report
Program Outcomes
By the end of this program, learners will be able to: