Upgrade to Pro — share decks privately, control downloads, hide ads and more …

Augmenting Offensive Security Operations with AI

Augmenting Offensive Security Operations with AI

ISC2 Security Congress 2025 (Oct/2025)

In the ever-evolving cybersecurity threat landscape, offensive security operations are crucial for staying ahead of the latest actors. But how can we become efficient and escalate the continuous emulation of real Tactics, Techniques, and Procedures (TTPs)?

This talk digs into leveraging AI models to augment and scale penetration testing, red teaming, and attack emulation, from reading and interpreting Cyber Threat Intelligence to building and executing threat scenarios.

It covers:
- The applicability of various AI models to offensive security;
- Creating an AI-based workflow from threat intelligence reports through test execution and remediation support;
- Practical examples of scripting and AI to automate steps in the Offensive Security Operations workflow, based on existing frameworks.

ISC2 Security Congress 2025: https://2025isc2securitycongress.eventscribe.net/

Avatar for Daniel Marques

Daniel Marques PRO

October 29, 2025
Tweet

Resources

Demo: Using GPT-5 to classify a screenshot

https://youtu.be/9LDhm4d5UvQ

This recorded demo demonstrates how a threat actor can leverage AI (in this case, OpenAI's GPT-5) to classify a screenshot as a target either for phishing or password guessing.

Demo: Generate atomic test cases from CTI reports

https://youtu.be/D9jXWBLxR1I

This demo illustrates how n8n can be used to deploy a workflow that collects intelligence reports and generates Atomic Red Team test cases from their contents. The video was sped up to save time.

Talk recording

https://events.isc2.org/p/s/augmenting-offensive-security-operations-with-ai-6881

Recording available at the ISC2 Congress website.

More Decks by Daniel Marques

Other Decks in Technology

Transcript

  1. DISCLAIMER The views and opinions expressed in this talk are

    my own and do not necessarily represent those of my employer. These slides are provided for educational purposes only and are not to be relied upon as professional advice.
  2. Vulnerability Analysis Breach & Attack Simulation Penetration Testing Red/Purple Teaming

    Offensive Operations Programs These pillars have different goals and serve various purposes.
  3. Systematically approach your tasks, workflows, and systems icons designed by

    freepik Identify workflows Breakdown tasks Organize tools & data sources Note expected outcomes
  4. Leverage LLM capabilities in areas where they are more effective

    Summarization to generate reports Domain-specific problem solving Reasoning to help with planning
  5. “(…) The quality of a model’s response depends on the

    following aspects (outside of the model’s generation setting): The instructions for how the model should behave; the context the model can use to respond to the query; and the model itself.” - Chip Huyen, AI Engineering
  6. https://www.anthropic.com/engineering/effective-context-engineering-for-ai-agents “(…) One of the most common failure modes we

    see is bloated tool sets (…) curating a minimal viable set of tools for the agent can also lead to more reliable maintenance and pruning of context over long interactions.”
  7. Recon agent Objective: Continuous target identification Recon Methodology Tools Data

    collection Data sources Eyewitness Shodan Decision making Analysis and classification Storage Context
  8. Collect TTPs Interpret commands Create test cases Execute test cases

    Collect telemetry Generate report You can transform your workflows to continuously execute repetitive tasks
  9. Do test runs to test and use the results to

    improve the output First attempt Test run Reviewer
  10. IDEAS WORTH SPREADING Do not blindly trust input and output

    Somebody might be watching These models are tools, not the holy grail
  11. Context matters; don’t overlook it. 01 02 03 You may

    still need to perform some cleanup work. Consider your OPSEC and jailbreaking effort Key Takeaways
  12. Credits • Androids and building blocks - AI-generated with human

    touch-up • Icons designed by freepik • Men looking at the code on the board - Photo by Mikhail Nilov - https://www.pexels.com/photo/men-looking-at-the-code-on-the-board- 7988747/