Advent of Cyber Day 4


Day 4 — AI for Cyber Security

A Hands-On Christmas Showcase

Introduction

Welcome to Day 4 of the festive cyber security journey!

As snow melts around the data centre of The Best Festival Company (TBFC), servers hum with activity. This year, TBFC decided to retire their legacy chatbot, Van Chatty, and introduce a more advanced assistant — Van SolveIT.

Van SolveIT is an AI-powered cyber security assistant designed to help the elves work faster, smarter, and more securely. As Christmas approaches, the AI is used to identify vulnerabilities, automate repetitive tasks, and strengthen TBFC’s cyber defenses before any grinches attempt to disrupt the celebrations.


🎯 Learning Objectives

By the end of this showcase, you will understand:

  • How AI supports different cyber security roles

  • How AI assistants can be used for real-world cyber tasks

  • Key risks and limitations of AI in cyber security

  • Practical applications in defensive, offensive, and software security


🔌 Connecting to the Environment

Before starting, deploy the following:

  • Target VM

  • AttackBox

Ensure both machines are running.
Access the AI showcase via:

http://MACHINE_IP

(Use the AttackBox or a VPN-connected device.)


🤖 AI in Cyber Security

Artificial Intelligence is rapidly transforming cyber security. Vendors integrate AI because it excels at handling scale, speed, and complexity—areas where humans struggle.

🔍 AI Strengths and Cyber Security Use Cases

AI CapabilityCyber Security Application
Large-scale data processingLog analysis, network monitoring, system behaviour analysis
Behaviour analysisAnomaly detection and threat identification
Generative AIAlert summarisation and incident context generation

🔵 AI in Defensive Security

For blue teams, AI enhances efficiency by:

  • Detecting threats in real time

  • Automatically triaging alerts

  • Isolating compromised endpoints

  • Blocking phishing emails

  • Monitoring abnormal login behaviour

AI helps reduce alert fatigue while improving detection accuracy.


🔴 AI in Offensive Security

Red teams use AI to automate time-consuming tasks such as:

  • Reconnaissance and OSINT

  • Scanning and parsing large datasets

  • Attack surface mapping

This allows security testers to focus on creative exploitation and strategy, rather than repetitive groundwork.


⚙️ AI in Software Security

In application security, AI assists developers by:

  • Performing automated code reviews

  • Supporting SAST and DAST analysis

  • Identifying common vulnerabilities

However, AI still struggles to consistently generate secure code. Human oversight remains essential.


⚠️ Key Considerations When Using AI

While AI is powerful, it is not flawless. Important considerations include:

  • Hallucinations (incorrect or misleading outputs)

  • Data privacy risks

  • Model security and manipulation

  • Lack of transparency and bias

  • Potential impact during penetration testing

Always validate AI-generated results before acting on them.


🛠️ Practical Showcase

In this hands-on showcase, Van SolveIT is used across three cyber security domains:

🔴 Red Team

  • Generate and execute an exploit script

🔵 Blue Team

  • Analyse web traffic logs from an attack

⚙️ Software Security

  • Review vulnerable source code

Access the AI assistant here:

http://MACHINE_IP

🏁 Results

Final Showcase Flag:
THM{AI_MANIA}

Exploit Execution Flag:
THM{SQLI_EXPLOIT}

✔ No flag required for the final note


🎄 Final Thoughts

This showcase demonstrates how AI can significantly enhance cyber security operations across multiple roles. When used responsibly, AI increases efficiency, reduces workload, and improves decision-making.

However, AI should be treated as an assistant—not an authority. Human expertise, validation, and judgment remain critical to maintaining strong cyber defenses.

If you enjoyed this challenge, explore the Defending Adversarial Attacks room to learn how attackers target AI systems—and how to protect them.

Comments

Popular Posts