ChatGPT For Cybersecurity

HackerSploit
31 Dec 202240:02

Summary

TLDRThis video explores the utilization of Chat GPT for cybersecurity, offering insights into its capabilities and applications for both red and blue teams. The presenter demonstrates Chat GPT's ability to answer complex questions, generate code, and assist in tasks like vulnerability scanning and writing queries. The video addresses concerns about AI's impact on cybersecurity jobs, arguing that Chat GPT enhances knowledge and efficiency rather than replacing human professionals. It concludes with a discussion on the importance of validating Chat GPT's information and using it as a tool to improve cybersecurity practice.

Takeaways

  • 🤖 Chat GPT is an AI-driven chatbot by OpenAI that uses reinforcement learning from human feedback (RLHF) and is built on top of the GPT 3.5 language models.
  • 🔍 It is designed to answer follow-up questions, admit mistakes, challenge incorrect premises, and reject inappropriate requests, showcasing its conversational capabilities.
  • 🆓 Chat GPT is currently free during its research preview stage but is expected to be placed behind a paywall once the preview ends.
  • 🛠️ The tool can be utilized for various cybersecurity tasks, demonstrating its potential to be an invaluable resource for both red team (offensive security) and blue team (defensive security) practitioners.
  • 🔑 Chat GPT can generate code snippets, identify vulnerabilities, and provide solutions, which can streamline tasks for cybersecurity professionals.
  • 🚫 Despite its capabilities, Chat GPT is programmed to reject requests that may violate its content policy, such as generating phishing emails.
  • 💡 The video suggests that Chat GPT can enhance the knowledge and skills (KSAs) of cybersecurity professionals rather than replace them, by providing quick and efficient answers to complex questions.
  • 📚 It emphasizes the importance of the NICE framework, which uses KSAs to assess an individual's qualifications and readiness for a job role.
  • ⚠️ The script highlights the need to validate information obtained from Chat GPT due to the lack of displayed sources and the potential for inaccuracies.
  • 📝 The presenter advises being specific and providing context when asking Chat GPT questions to receive the most accurate and useful responses.
  • 👍 The video concludes by encouraging viewers to try Chat GPT for themselves and to share their thoughts, suggesting that the presenter is excited about the tool's potential and the discussions it will generate.

Q & A

  • What is the main focus of the video?

    -The video focuses on demonstrating how to utilize Chat GPT for cybersecurity, showing its capabilities and discussing its potential impact on the cybersecurity industry and jobs.

  • Why has Chat GPT received attention from the cybersecurity industry?

    -Chat GPT has received attention because cybersecurity professionals quickly adopted it to test its capabilities and discovered many innovative uses for it in the field.

  • What is the purpose of showing Chat GPT's capabilities in the video?

    -The purpose is to illustrate the potential of Chat GPT as a tool for improving knowledge, skills, and abilities in cybersecurity and to encourage viewers to explore its uses themselves.

  • What is Chat GPT and how does it work?

    -Chat GPT is an AI-driven chatbot launched by OpenAI in November 2022. It is trained using reinforcement learning from human feedback and is built on OpenAI's GPT 3.5 family of large language models.

  • How can one get started with Chat GPT?

    -To get started with Chat GPT, one can visit the provided link, create a free account, and access the chatbot at chat.openai.com.

  • What is the difference between Chat GPT and Instruct GPT?

    -Chat GPT is optimized for dialogue, allowing it to answer follow-up questions and interact conversationally, while Instruct GPT is trained to follow an instruction prompt and provide detailed responses.

  • What are some limitations of Chat GPT mentioned in the video?

    -One of the limitations mentioned is that Chat GPT can be excessively verbose and overuse certain phrases, such as restating that it's a language model trained by Open AI.

  • How can Chat GPT assist cybersecurity students or practitioners?

    -Chat GPT can provide detailed explanations, code snippets, and guidance on various cybersecurity topics, which can be an invaluable resource for learning and problem-solving in the field.

  • What is an example of a red team use case for Chat GPT demonstrated in the video?

    -An example of a red team use case is generating a PHP reverse shell one-liner and encoding it in base64, which can be useful for penetration testing.

  • How does Chat GPT handle requests that may violate its content policy?

    -Chat GPT will refuse to generate content that may violate its content policy, such as creating a phishing email, and will inform the user of the violation.

  • What is the potential impact of AI, like Chat GPT, on cybersecurity jobs according to the video?

    -The video suggests that AI, including Chat GPT, will not make cybersecurity professionals redundant but instead will enhance their knowledge and skills, making them more efficient in their roles.

  • What is the Knowledge, Skills, and Abilities (KSA) framework mentioned in the video?

    -The KSA framework is a model used to categorize a person's abilities and readiness for a job. It breaks down a person's qualifications into knowledge (theoretical understanding), skills (technical proficiencies), and abilities (demonstratable capacity to apply knowledge and skills).

  • What advice does the video give regarding the use of Chat GPT for research?

    -The video advises to always validate the results obtained from Chat GPT, be specific with questions, provide context, and not rely solely on Chat GPT for research due to its current limitations and lack of real-time learning.

Outlines

00:00

🤖 Introduction to Chat GPT for Cybersecurity

The speaker introduces a video focused on utilizing Chat GPT for cybersecurity purposes. They explain the intent to demonstrate Chat GPT's capabilities and its potential impact on the cybersecurity industry. The video aims to address questions about Chat GPT's influence on cybersecurity jobs and its use as a tool to improve knowledge and skills in the field. The speaker shares their experience with Chat GPT and its training process involving reinforcement learning from human feedback. The video promises a practical demonstration and a discussion on the long-term effects of AI on cybersecurity.

05:01

🔒 Exploring Chat GPT's Features and Limitations

This paragraph delves into the features of Chat GPT, highlighting its conversational method of interaction and its ability to answer follow-up questions, admit mistakes, and reject inappropriate requests. The speaker discusses the model's training process, including reinforcement learning from human feedback and its relation to Instruct GPT. They also mention the limitations of Chat GPT, such as verbosity and overuse of certain phrases, and the iterative deployment of the model. The speaker provides examples of how Chat GPT can be used, particularly in the context of coding and development, emphasizing the importance of providing context for nuanced questions.

10:03

📚 Demonstrating Chat GPT's Practical Applications

The speaker provides a live demonstration of Chat GPT's capabilities by interacting with it through the open AI website. They showcase how to create an account, access the chatbot, and utilize its conversational format to ask questions and receive detailed answers. Examples given include defining terms, providing explanations, and generating code snippets for tasks like scanning for SMB vulnerabilities with nmap. The speaker emphasizes the value of Chat GPT as an educational resource for cybersecurity students and professionals.

15:05

🎯 Advanced Cybersecurity Queries with Chat GPT

The paragraph explores more complex uses of Chat GPT for cybersecurity, including generating code for tasks like creating a PHP reverse shell and fuzzing XML files with gobuster. The speaker demonstrates how Chat GPT can provide detailed explanations and code examples, even when prompted with advanced and specific cybersecurity-related questions. They highlight the potential of Chat GPT to streamline research and problem-solving in cybersecurity.

20:05

🛠️ Generating Code and Automating Tasks with Chat GPT

The speaker discusses Chat GPT's ability to generate code and automate tasks, such as creating a shell code that executes cmd.exe or generating a macro for Office Suite. They also show how Chat GPT can help in writing emails, automating port scanning with bash scripts, and even creating CTF challenges with specific vulnerabilities. The video illustrates the versatility of Chat GPT as a tool for both red team and blue team cybersecurity operations.

25:08

🛡️ Utilizing Chat GPT for Blue Team Operations

This section focuses on how Chat GPT can be used to support blue team operations. The speaker shows examples of using Chat GPT to write search queries for detecting registry changes in Windows logs, build regular expressions for filtering IP addresses in Splunk, and identify vulnerabilities in provided PHP code. They emphasize Chat GPT's potential as a resource for improving knowledge and efficiency in cybersecurity practices.

30:10

🤖 The Impact of AI on Cybersecurity Careers

The speaker addresses concerns about the impact of AI, specifically Chat GPT, on cybersecurity careers. They argue that Chat GPT will not replace cybersecurity professionals but will instead enhance their knowledge and skills. The video discusses the NIST and NICE frameworks for assessing knowledge, skills, and abilities, suggesting that Chat GPT can significantly improve the knowledge aspect of cybersecurity professionals' competencies.

35:10

🚀 Conclusion and Future Outlook on Chat GPT

In the concluding paragraph, the speaker summarizes the benefits of Chat GPT as a resource for improving knowledge and efficiency in cybersecurity. They highlight the importance of not relying solely on Chat GPT and the need to validate its outputs. The speaker also expresses excitement about future videos that will explore more resources and integrations with Chat GPT for both red and blue team operations. They invite viewers to share their thoughts and engage in a discussion in the comments section.

Mindmap

Keywords

💡Cybersecurity

Cybersecurity refers to the practice of protecting internet-connected systems, including hardware, software, and data, from theft, damage, or unauthorized access. In the video's context, it is the main theme as the presenter discusses the use of Chat GPT in both offensive (red team) and defensive (blue team) cybersecurity operations. The script mentions cybersecurity professionals quickly adopting Chat GPT to discover its capabilities.

💡Chat GPT

Chat GPT is an AI-driven chatbot developed by OpenAI that uses reinforcement learning from human feedback to engage in conversational interactions. The video showcases Chat GPT's potential in cybersecurity, demonstrating how it can assist in tasks such as scanning for vulnerabilities, generating code, and providing explanations for complex concepts.

💡Red Team

In cybersecurity, the red team represents the offensive security side, simulating attacks to evaluate an organization's security posture. The script provides examples of how Chat GPT can be utilized on the red team side, such as generating a PHP reverse shell one-liner or fuzzing XML files with gobuster.

💡Blue Team

The blue team in cybersecurity is responsible for the defensive side, monitoring and protecting systems from threats. The video discusses Chat GPT's applications for the blue team, like helping to write search queries for detecting registry changes or identifying vulnerabilities in code.

💡Reinforcement Learning from Human Feedback (RLHF)

RLHF is a learning technique where an AI model is trained based on feedback from human interactions. The script explains that Chat GPT is trained using this method, making it capable of conversational interactions and the ability to learn from and adapt to user inputs.

💡Knowledge, Skills, and Abilities (KSAs)

KSAs refer to the knowledge, skills, and abilities an individual needs to perform a job successfully. The video emphasizes that Chat GPT can enhance a cybersecurity professional's KSAs by providing quick and efficient access to information, thus improving their overall capabilities in the field.

💡Vulnerability Scanning

Vulnerability scanning is the process of detecting potential weaknesses in a system that could be exploited by attackers. The script demonstrates Chat GPT's ability to provide commands for scanning SMB vulnerabilities with nmap, illustrating its utility in vulnerability assessment.

💡Code Generation

Code generation is the creation of new source code using automated tools. The video shows Chat GPT's capability to generate code snippets, such as a PHP reverse shell or a bash script for automating port scanning, highlighting its potential as a coding aid.

💡Buffer Overflow

A buffer overflow is a type of security vulnerability that occurs when a program attempts to write more data to a fixed-length block of memory, or buffer, than it can hold. The script includes an example where Chat GPT generates C code vulnerable to buffer overflows and explains how to fix it, demonstrating its educational value.

💡SQL Injection

SQL injection is a code injection technique used to attack data-driven applications, where malicious SQL statements are inserted into an entry field for execution. The video demonstrates Chat GPT's ability to identify and provide solutions for SQL injection vulnerabilities in PHP code, showcasing its utility in secure coding practices.

Highlights

Introduction to utilizing Chat GPT for cybersecurity, explaining its capabilities for both red and blue teams.

Chat GPT has gained significant attention in the technology and cybersecurity industry.

Demonstration of Chat GPT's ability to answer questions and provide examples for cybersecurity tasks.

Chat GPT is an AI-driven chatbot launched by OpenAI, trained using reinforcement learning from human feedback.

Explanation of Chat GPT's conversational method of interaction, allowing follow-up questions and corrections.

Chat GPT's response to specific cybersecurity queries, like scanning for SMB vulnerabilities with nmap.

Generation of a PHP reverse shell one-liner by Chat GPT.

Chat GPT's ability to encode code snippets, such as base64 encoding.

Demonstration of Chat GPT providing commands for fuzzing XML files with gobuster.

Chat GPT's capacity to generate shell code that executes cmd.exe.

The ethical stance of Chat GPT when asked to generate a phishing email, highlighting content policy adherence.

Creation of a bash script for automating port scanning with nmap by Chat GPT.

Chat GPT's assistance in writing an email to employees about end-of-year bonuses.

Generation of a macro that executes cmd.exe by Chat GPT.

Chat GPT's explanation of buffer overflow vulnerabilities and provision of vulnerable C code.

Discussion on the impact of AI like Chat GPT on cybersecurity jobs and the industry.

Highlighting that Chat GPT will not replace cybersecurity professionals but enhance their knowledge and skills.

The importance of the knowledge, skills, and abilities (KSAs) framework in assessing and improving cybersecurity professionals' competencies.

Advice on using Chat GPT responsibly and not relying solely on it for cybersecurity tasks.

Transcripts

play00:02

foreign

play00:04

[Music]

play00:08

here back again with another video in

play00:12

this video I'm going to be showing you

play00:14

how to utilize chat GPT for cyber

play00:17

security

play00:18

um so I'm gonna you know start off by

play00:19

explaining what it is uh because a lot

play00:21

of you have asked me about it and uh

play00:23

sort of giving you examples of how it

play00:25

can be used both on the red team side of

play00:28

cyber security as well as the blue team

play00:30

site and of course we'll be discussing

play00:32

my haircut in the comments section but

play00:34

let's get started so I'm just going to

play00:37

give you a you know very uh brief

play00:39

introduction uh in the form of slides

play00:42

because I think that's most appropriate

play00:44

um so why am I making this video uh well

play00:46

firstly as you already know chat jpt has

play00:49

received a lot of attention from the

play00:51

technology industry and specifically the

play00:53

cyber security industry and this is

play00:56

something that you know uh you know took

play00:58

open AI the company behind chat jpt by

play01:01

surprise uh given the fact that you know

play01:03

cyber Security Professionals will

play01:05

quickly jump on chat apt and test it and

play01:08

we've discovered a lot of crazy things

play01:09

that can be done so the main objective

play01:13

here is to show you how you can how tall

play01:15

to use it is very very simple and then

play01:16

of course show you what it's capable of

play01:18

at a very basic level of course I'm

play01:20

encouraging you to try it out for

play01:22

yourself so there have been a lot of

play01:24

questions surrounding the impact uh you

play01:26

know the effects that chap uh chat GPT

play01:28

will have on cyber security uh the cyber

play01:30

security industry and practitioners so

play01:32

that's one of the second reasons why I'm

play01:34

making this video is I've gone a lot of

play01:37

private messages are asking me well uh

play01:39

you know chat GPT is cool but what

play01:41

impact will this have not just through

play01:44

chat GPT but generally speaking what

play01:46

impact will AI have on cyber security

play01:49

and will this affect cyber security jobs

play01:51

so on and so forth and the other reason

play01:54

of course is it's an invaluable tool or

play01:56

resource that can be used to improve

play01:58

your ksas that is knowledge skills and

play02:00

abilities in a particular field within

play02:02

cyber security but not limited to cyber

play02:05

security as you'll see and finally of

play02:07

course it's a game changer in my opinion

play02:09

now the main question is why have I

play02:11

taken this long to make a video on

play02:14

chatgpt well the reason for that is

play02:16

firstly I wanted to try it out for

play02:17

myself

play02:18

and also think quite deeply about the

play02:22

second Point here which is a question

play02:24

and that is how will this affect cyber

play02:26

security in the long term all right and

play02:28

I'll be answering that towards the end

play02:30

of the video so lots of reasons and I

play02:34

wanted to take my time and sort of under

play02:36

stand it get an idea of what it can and

play02:38

can do what are its benefits and of

play02:41

course limitations so that begs the

play02:43

question what is chat GPT well chat GPT

play02:47

is an AI driven chatbot launched by

play02:50

openai in November 2022 it is trained

play02:54

using reinforcement learning from Human

play02:56

feedback which is a um

play02:59

a learning technique and of course that

play03:02

the abbreviation for that is RL HF which

play03:04

I'll touch upon and it's built on top of

play03:07

openai's GPT 3.5 family of large

play03:10

language models and is fine-tuned with

play03:13

both super supervised and reinforced

play03:16

learning techniques and you can get

play03:17

started with uh chat DPT by visiting the

play03:20

following link it is currently free at

play03:22

the moment because it's still in the

play03:23

preview mode and I'll explain what that

play03:27

means but you'll actually learn a lot

play03:29

about this shortly so

play03:31

that's essentially an intro to chat GPT

play03:33

now the best way to show you this is to

play03:36

actually give you a demo so I'm going to

play03:37

switch over to my browser and we can get

play03:40

started

play03:42

all right so I'm currently on the open

play03:44

AI website and the reason I want to

play03:47

start off here is because this is your

play03:49

starting point so you'll need to create

play03:51

an account is free and then you'll have

play03:52

access to uh chatgpt or the chatbot

play03:56

itself which is accessible on the

play03:57

chat.openei.com

play03:59

but before that we need to understand a

play04:01

few things so right on the website we

play04:04

have a a brief description so you can

play04:06

see chat GPT optimizing the language

play04:08

models for dialogue so we've trained a

play04:11

model called chatgpt which interacts in

play04:14

a conversational way that's very

play04:15

important one of the the great things

play04:17

that a lot of people have liked about

play04:18

chat GPT and really on the utilized is

play04:22

its conversational uh method of of

play04:25

interacting with you or with you know

play04:28

you interacting with it so what this

play04:30

means is that the dialog format makes it

play04:32

possible for chat TPT to answer

play04:34

follow-up questions which is something

play04:35

again that you should take advantage of

play04:37

admit its mistakes challenge incorrect

play04:40

premises and reject inappropriate

play04:43

requests so in addition to just giving

play04:45

you answers and you're responding in

play04:47

let's say a way that it expects you know

play04:49

sort of asking a follow-up question you

play04:52

can also you know essentially tell the

play04:56

actual chatbot that hey this doesn't

play04:57

look correct and uh you know the

play05:01

response obviously will either be too

play05:03

you know to cross verify that or to tell

play05:05

you you know this is where it's limited

play05:07

so on and so forth so

play05:10

um chat Deputy is a sibling model to

play05:12

instruct GPD which is trained to follow

play05:14

an instruction prompt and provide a

play05:16

detailed response and of course you can

play05:19

scroll down right over here and you know

play05:21

you know they essentially go over some

play05:23

of its strengths and weaknesses and at

play05:25

the moment you can see it's free uh

play05:27

during the research preview stage and

play05:30

this is a tool that obviously is gonna

play05:32

be priced or BPI is going to be behind a

play05:35

paywall and you'll see why in a couple

play05:38

of seconds so you can see that again

play05:40

they give a couple of examples here

play05:42

specifically for developers where you

play05:44

can put in a code snippet or a chunk of

play05:47

code and say this code is not working

play05:49

like I expect how do I fix it all right

play05:52

so there's two questions in that one

play05:53

statement and it's a very detailed

play05:55

specific question and you know you the

play05:58

user paste in the snippet of code and

play06:01

you can see the response from chat GPT

play06:03

is you know tells you it's difficult to

play06:04

say what's wrong with the code without

play06:05

more context so this is something that's

play06:08

very very important uh for bespoke

play06:11

questions or very nuanced questions

play06:14

um you will be required to provide

play06:16

context and that is something that you

play06:19

need to be acutely aware of anyway you

play06:22

can see that jtbt responds and you know

play06:25

the user says the error never surfaces I

play06:28

think there's something wrong with the

play06:30

channel so you know there's essentially

play06:32

a conversation there so on and so forth

play06:34

and they go ahead and explain the

play06:36

methods so this is where we have the um

play06:38

reinforcement learning from Human

play06:40

feedback uh technique and this is the

play06:44

same technique used or the same method

play06:46

that's used as or within instruct GPT

play06:49

with slight differences in the data The

play06:52

Collection setup so they've trained the

play06:53

initial model using a supervised

play06:55

fine-tuning human AI trainers provided

play06:58

you know provided conversations in which

play07:02

they played both sides the user and the

play07:04

the AI assistant we gave the trainers

play07:07

access to model written suggestions to

play07:10

help them compose their responses we

play07:12

mixed this new dialogue data set with

play07:14

the instructor GPT data set so on and so

play07:16

forth so they actually explained this

play07:18

entire process which I recommend you go

play07:20

through and of course they outline the

play07:23

limitations so I'll specifically talk

play07:27

about one of the limitations here

play07:31

and uh this one right over here so the

play07:34

model is often excessively uh verbose

play07:36

and over uses certain phrases such as

play07:39

restating that it's a language model

play07:40

trained by open AI so on and so forth

play07:42

and you'll actually see that so

play07:44

uh yeah and then finally of course it's

play07:46

an iterative deployment so do take note

play07:49

of that and um you know you can actually

play07:51

go through their website now to get

play07:53

started uh you can see I've signed in

play07:55

and this is the interface uh

play07:58

fundamentally speaking so you can see

play08:00

that you have the Discord server at the

play08:02

bottom here and you can switch to a

play08:03

light mode or a dark mode and you can

play08:06

you know check the latest updates and

play08:08

the FAQ pages and you can log out and

play08:10

you can create new chats here so I'm

play08:13

currently interacting with it here and

play08:14

it gives you very useful uh very useful

play08:17

starting point so you have examples

play08:18

capabilities and limitations

play08:21

and we're going to be taking a look at a

play08:24

couple of examples both on the red team

play08:26

side and the blue team side of things so

play08:28

just keep that in mind and you know

play08:30

you'll actually see how powerful this is

play08:33

um so to get started um how does this

play08:35

work well you essentially ask it a

play08:36

question all right that's very very

play08:38

simple you just say uh you know so I can

play08:40

ask for example what is red teaming very

play08:44

simple question right and this is how

play08:47

it'll respond so it'll say red taming is

play08:49

a method you know of evaluating the

play08:50

strengths and weaknesses of plan

play08:51

organizational or system by simulating

play08:54

the actions of an adversary uh we can

play08:57

send you know

play08:58

uh we can then ask it a follow-up

play09:00

question this is not really a good

play09:01

example but um I'll show you what that

play09:04

looks like so you ask it a question and

play09:05

it gives you a definition now one of the

play09:08

the issues that I have especially for

play09:10

researchers is this definition of course

play09:13

does not you know it doesn't tell you

play09:15

where it's obtained the definition of

play09:16

course there's multiple sources behind

play09:18

the data set but it doesn't give you the

play09:21

actual sources so for researchers you

play09:23

know this will sort of give you a very

play09:24

succinct explanation which you can then

play09:27

derive from and then perform further

play09:29

research but you know you ask it a

play09:31

question and

play09:32

um you know

play09:33

it then gives you a response based on

play09:35

what you asked it so in this case I can

play09:37

say what's uh for example what is nine

play09:41

times eleven sorry what is nine

play09:45

um times 11.

play09:47

I can ask it that uh the way and say

play09:49

that uh is incorrect all right that's

play09:53

sort of the responses that you can give

play09:57

so you can see I told you that it's

play09:59

incorrect now of course I know it's

play10:00

correct but it tells you right over here

play10:03

I apologize for the mistake the correct

play10:04

answer is 99. please let me know if you

play10:06

have any other questions so this is one

play10:08

of the important things that I wanted to

play10:10

touch upon is that you can have a

play10:12

dialectic

play10:13

um you know discussion or dialogic

play10:16

discussion with the actual chatbot and

play10:18

it's very intelligent now of course I've

play10:20

used very stupid examples but you also

play10:22

have the ability to modify your

play10:24

questions and more importantly you can

play10:26

also start a new chat so I'm just going

play10:28

to delete this one here because if you

play10:31

take a look at this here it remembers

play10:32

what the user said earlier in the

play10:34

conversation so for different topics and

play10:36

contexts I'm just going to create a new

play10:38

chat like we have over here so I'll give

play10:41

you a simple example of what a cyber

play10:43

security student or practitioner may ask

play10:45

a chat GPT so for example I can say uh

play10:49

let's try and change it we can say how

play10:52

can I scan uh for SMB vulnerabilities

play10:58

with nmap you know that's a it's a very

play11:02

I wouldn't say it's a very specific

play11:04

question but we're asking it a question

play11:06

that's loaded with context and uh what

play11:09

am I saying when I say this well we've

play11:10

mentioned a tool we've mentioned a

play11:13

specific technology SMB and this is in

play11:16

the context of both offensive and

play11:18

defensive security but I can say you

play11:19

know I can ask the question here

play11:21

uh now this is one of the issues with

play11:23

its verbosity in that it now it gives

play11:25

you a definition of nmap which is very

play11:26

very helpful

play11:28

um but um you can see that uh right over

play11:32

here it gives you the definition of what

play11:33

nmap is and then it says to scan it uh

play11:36

to scan for SMB vulnerabilities with

play11:38

nmap you can use the following command

play11:39

and it actually gives you the the actual

play11:41

code snippet here so nmap you limit the

play11:44

scan to Port 445 and then you specify

play11:47

the script option and then you specify

play11:49

the SMB vulnerability scripts but use

play11:53

the wildcard flag right over here or the

play11:56

wildcard option to specify that you want

play11:58

to use all nmap scripts and then specify

play12:00

the Target right and then it gives you a

play12:02

follow-up explanation which is awesome

play12:03

so it tells you that this will scan the

play12:05

target host for network uh this will

play12:07

scan the target host on network for SMB

play12:10

vulnerabilities and then it explains

play12:12

what each of the options in flag flags

play12:14

do and then it says radio you can also

play12:16

use the a option to enable OS detection

play12:19

and version scanning so on and so forth

play12:22

so

play12:23

I mean this is absolutely incredible if

play12:26

you think you know if I think about it

play12:27

from when I was a student or when I was

play12:29

getting into cyber security this is an

play12:32

invaluable resource now why am I saying

play12:34

this you know you might be saying well

play12:35

there's resources online that you can

play12:36

find via Google and that's true however

play12:39

to ask to be able to ask a question like

play12:42

this with a very basic I would say

play12:45

grammar or I did maybe I didn't

play12:46

structure it correctly but I had enough

play12:48

context and for this explanation uh you

play12:51

know for this question to be answered

play12:52

with such a you know really well written

play12:56

explanation and examples of code

play12:58

Snippets as well as

play13:01

um the actual explanation of what the

play13:03

command does is absolutely fantastic so

play13:07

that's a very basic example now we can

play13:11

try out a couple of other examples so

play13:13

for example you know I can say

play13:15

um

play13:16

generate a PHP reverse shell one liner

play13:21

now this is you know you may be asking

play13:23

yourself can I do this well of course so

play13:24

it gives you the definition of what a

play13:27

reverse shell is and then absolutely

play13:30

incredible it provides you with a

play13:34

it provides you with a PHP reverse shell

play13:37

one-liner and explains how it works

play13:40

fundamentally speaking I mean this is

play13:42

absolutely insane now follow-up question

play13:44

that I could ask is

play13:46

encode the code above

play13:50

you know

play13:51

and then right over here it tells us you

play13:54

know to encode the PHP reversial one

play13:56

lineup you can use a tool such as base64

play13:59

so you know we didn't provide it with

play14:01

context with regards to how we want to

play14:04

encode it but you know we can ask

play14:05

follow-up questions and this is

play14:08

absolutely phenomenal so it encodes it

play14:10

in base 64. and you can see this will

play14:13

output the encoded version right over

play14:15

here that's how to generate it as a you

play14:17

know one-liner base64 string and to

play14:21

decode it you know it gives you

play14:22

instructions not to decode it so

play14:25

absolutely phenomenal so these are just

play14:27

a couple of examples now I can even go a

play14:29

bit further with this I can say for

play14:32

example

play14:33

um

play14:34

let's try something a bit a bit more

play14:37

nuanced so I can say uh how can I fuzz

play14:41

uh sorry let me type that in correctly

play14:43

how can I fuzz 4

play14:46

um XML files with gobuster and let me

play14:50

make sure you guys can see this but

play14:52

there we are you can see how can I fast

play14:53

for example files with Go Buster

play14:56

that we also gives you a definition of

play14:58

what gobuster is and um

play15:01

you know this is absolutely incredible

play15:05

so it actually explains really

play15:08

everything about that particular command

play15:10

and it then gives you an example

play15:13

and I can show you another follow-up

play15:15

that you can ask it as you know as we

play15:17

are curious pen testers really uh you

play15:19

know we could maybe say all right so

play15:23

um

play15:24

let's see if I can if this will work so

play15:26

I can say

play15:27

um

play15:48

uh we can say fuzz how can I I'll just

play15:51

write it here so using the above code

play15:52

how can I also limit gobuster to fuzz or

play15:56

um PHP files

play15:59

that return

play16:01

a let's see this is actually a quite

play16:04

difficult return a not difficult you

play16:06

know very simple to understand to

play16:08

understand but let's say return a 200 uh

play16:12

status code

play16:14

let's see if this actually works this is

play16:16

uh you know

play16:18

there we are it actually works so tells

play16:20

us how to limit uh you know files that

play16:23

were found that return at 200 um an HTTP

play16:26

200 status code so I mean this is

play16:30

absolutely incredible now of course

play16:32

we're taking a look at Red Team examples

play16:34

and I'll I'll go through a couple more

play16:35

just to show you how robust this is and

play16:38

uh you know again the same question may

play16:40

be asked uh you know

play16:43

wouldn't be wouldn't this be easier to

play16:45

search for directly on Google and the

play16:47

answer is yes you can search for the

play16:49

same thing however I don't think Google

play16:51

can answer this question as specifically

play16:53

as chat GPT has so for sure once the

play16:57

research preview has ended they are

play16:58

going to put this behind a paywall I

play17:01

definitely deserves that I mean I'd be

play17:02

happy to pay for this I found tremendous

play17:06

use

play17:07

um

play17:08

I found this extremely useful when doing

play17:10

research so on and so forth but uh you

play17:13

know that's just a very basic example

play17:15

that you can do now you may be asking is

play17:17

it just limited to commands can we

play17:19

generate some code of course we can so I

play17:21

can say

play17:22

um

play17:23

generate a Shell Code

play17:26

uh that executes

play17:29

cmd.exe so let's say you want to

play17:31

generate some Shell Code all right it

play17:33

explains what's Shell Code it explains

play17:35

what shell code is and then it gives you

play17:39

some sample Shell Code that will execute

play17:40

command.exe

play17:43

all right there we are so just wait for

play17:46

it to complete generating of course it

play17:48

doesn't format it correctly but you get

play17:50

that there now of course another thing

play17:52

that I need to State and you'll see this

play17:54

shortly is based on their

play17:57

uh the actual policies and guidelines

play18:00

you can really you know

play18:03

interact with chat GPD in a way that may

play18:06

produce results or information that

play18:08

could be used for illegal activity so I

play18:11

can say you know generate a phishing

play18:13

email and you'll see the response here

play18:16

so once it's done with this particular

play18:18

question

play18:20

or query if you will

play18:22

I can say generate a phishing email

play18:24

there we are so it tells us right over

play18:26

here this content may violate our

play18:28

content policy and what we can do then

play18:31

let's say you know we don't regenerate a

play18:33

phishing email it's too abstract anyway

play18:35

but let's say we're trying to generate

play18:37

some a very well written email so we can

play18:40

for example say

play18:42

um

play18:43

let's see

play18:45

um I can say write an email informing

play18:49

employees of uh sorry let me type that

play18:53

in

play18:54

informing employees

play18:56

of end of year bonuses

play19:00

let's say we want to perform you know

play19:02

phishing campaign we want to generate a

play19:05

very well written email you can see it

play19:08

actually does that for you so I mean

play19:09

this is absolutely insane even more

play19:11

insane than my haircut so anyway uh

play19:14

getting back to this but uh you know it

play19:16

actually it actually highlights areas of

play19:19

substitution but there we are dear old

play19:21

uh I am pleased to announce that our

play19:23

company will be offering end of year

play19:24

bonuses to all employees and of course

play19:25

you can modify this and say click on the

play19:27

following Excel or click on the

play19:29

following document and sign it so on and

play19:30

so forth and you know the that

play19:32

particular document could contain a

play19:34

macro speaking of macros can we generate

play19:38

a macro

play19:40

um let's try this we can say generate a

play19:43

macro that executes and I'm sticking to

play19:47

cmd.exe for Simplicity here that

play19:50

executes cmd.exe

play19:54

all right so it explains what macros are

play19:56

in the context of office or the office

play19:58

suite

play20:00

um and it actually generates that macro

play20:03

so

play20:05

uh yeah yeah this is absolutely insane

play20:09

uh and then you know I can ask it a

play20:10

follow-up question

play20:12

um

play20:15

on the above code modify the above code

play20:19

uh

play20:23

to execute

play20:26

a

play20:29

Powershell script I know this is quite

play20:31

stupid but uh you know I can ask it to

play20:33

do this you can see that the only thing

play20:35

substituted would be you know specifying

play20:37

the path to the actual partial script

play20:39

but I mean absolutely phenomenal I I

play20:42

don't know whether you guys can see how

play20:43

excited I am and this is this is like

play20:45

insane do I have this type of resource

play20:48

available is uh I mean I I can't even

play20:51

believe that I'm seeing this

play20:54

um

play20:56

whatever you are doing this you know

play20:58

some buff overflows which I'll be

play21:00

covering on the channel uh but you can

play21:01

say

play21:04

C code vulnerable

play21:07

to buffer overflows

play21:11

you know very simple question explains

play21:13

what a buffer overflow is

play21:15

and

play21:17

there we go generates the C code and

play21:20

then it'll um let's see if it actually

play21:21

provides an explanation there we are as

play21:23

to why it is vulnerable so this can be

play21:25

seen as both you know useful from the

play21:27

perspective of a red team and blue team

play21:31

um

play21:32

but you can see there we are it actually

play21:34

explains that and uh

play21:38

we can say fix the above code if I can

play21:43

type correctly today

play21:45

there we are and um

play21:48

where it'll actually show you how to fix

play21:50

the the buff overflow vulnerability this

play21:53

is this is mind-boggling guys and of

play21:55

course I would love to hear what your

play21:57

thoughts are in the comments section now

play21:58

I'll be making follow-up videos on chat

play22:00

GPT because there's a tons there's tons

play22:02

of resources you know the desktop

play22:04

applications the browser extensions uh

play22:07

plugins for you know tools like Ida that

play22:09

have been released I'll be covering them

play22:11

how they they can sort of be utilized to

play22:14

streamline the operations but these are

play22:17

sort of the examples now I'll touch on a

play22:20

couple of other examples for red team as

play22:21

and I'll show you some blue team

play22:23

examples

play22:24

um you know so

play22:25

and another one maybe could be uh you

play22:28

know generate a bash script and this is

play22:32

really cool and I'll show you why bash

play22:34

script to that

play22:36

um

play22:37

that automates Port scanning within map

play22:42

all right

play22:46

I mean this is it actually provides

play22:48

documentation I mean this is absolutely

play22:51

insane now of course

play22:53

this is something that you need to

play22:54

verify you know you can't just take this

play22:56

and run it in the case of more complex

play22:59

pieces of code but it also tells you how

play23:02

to execute the

play23:04

just absolutely insane hope you guys are

play23:07

excited as I am so that's very simple

play23:09

but we can also do a bit of chaining

play23:11

here so in addition to that I can say uh

play23:15

I need a bash script

play23:18

that automates

play23:21

a sub domain enumeration with a tool

play23:26

with you can say sublister

play23:30

and

play23:32

um

play23:32

takes screenshots

play23:39

with eyewitness this is more so for

play23:41

those you know of you who are bug bounty

play23:44

hunters uh it actually generates it and

play23:46

looks like it gives us that uh

play23:48

uh warning here

play23:50

but uh

play23:52

with regards to context I mean

play23:55

I I can't believe what I'm saying I mean

play23:58

honestly I don't know whether you guys

play23:59

can

play24:01

um this is absolutely insane so you can

play24:03

say it you know prompts the user for the

play24:05

sub for the Target domain and then

play24:07

enumerates it with uh with subflist

play24:10

auto-based the process and it outputs it

play24:12

into a text file and then utilizes

play24:15

eyewitness to take screenshots and yeah

play24:18

just absolutely insane now

play24:23

um

play24:24

another cool example that I had seen

play24:26

recently on Twitter is we can say

play24:29

generate a CTF

play24:32

challenge

play24:34

um that contains an SQL injection

play24:40

vulnerability

play24:42

okay

play24:45

oh all right okay all right yeah so we

play24:48

got the error there doesn't look like it

play24:50

works anymore but I'll show you

play24:51

something really interesting in a second

play24:52

so we've taken a look at some really

play24:54

interesting red team examples I'll touch

play24:56

upon blue team so let's take a look at

play24:58

that now

play25:00

all right so

play25:01

I have created a new

play25:04

um a new chat here so for blue team how

play25:07

can this be used well let's take some

play25:09

tools that you typically utilize so for

play25:12

example we can say let's say we're

play25:15

trying to learn how to

play25:17

write a search query to identify changes

play25:21

in Windows registry right on the Windows

play25:23

registry from

play25:25

the logs that are and events that are

play25:27

being sent to Elk so you can say elk

play25:29

query to detect

play25:32

um registry changes

play25:36

okay that gives you an intro to the

play25:40

elastic or rather the elk stack and then

play25:44

I hope you guys are seeing this but uh

play25:47

there we are

play25:51

here we are so event ID of 13 and uh

play25:54

absolutely insane

play25:56

uh so you can actually use this up you

play25:58

know a couple of examples are you know

play26:01

rejects or we can just say regular

play26:04

expression

play26:07

um

play26:07

built a IP addresses

play26:10

in Splunk let's say

play26:15

all right it explains what regular

play26:17

expression is

play26:18

and of course the code or rather the

play26:21

regular expression you can use to filter

play26:22

an IP address in Splunk and now for the

play26:25

final example in this case I'll use my

play26:27

own piece of code I'm going to paste in

play26:29

a piece of code here a PHP code that is

play26:33

vulnerable to SQL injection because of a

play26:35

lack of input sanitization

play26:37

and I'm going to show you that it can

play26:40

actually identify the issue again

play26:42

without you know if we had asked jpt to

play26:45

show give us an example of PHP code that

play26:47

was vulnerable to SQL injection hey you

play26:50

might be thinking yourself well you know

play26:51

it's going to it's going to very easily

play26:53

do that but let's provide our own code

play26:55

and let's see how smart it is at

play26:57

detecting that

play26:58

all right so I've just brought up a

play27:02

a PHP piece of PHP code that is

play27:05

vulnerable to SQL injection so you know

play27:07

like in this case I can say

play27:10

um

play27:10

what's wrong with this PHP code

play27:16

very simple right and I paste in the

play27:18

snippet there

play27:20

and it tells us that there's a few

play27:22

potential issues with the PHP code so it

play27:24

says the arcv arrays used to pass

play27:26

command line arguments to a PHP script

play27:28

this is correct and then of course the

play27:31

second Point here the get arrays used to

play27:33

pass data to the to a PHP script through

play27:37

the URL query string but it is not safe

play27:40

to use uh user provided

play27:43

um

play27:43

let's see it's not safe to uh to use

play27:46

user provided data directly in a SQL

play27:49

query an attacker could manipulate the

play27:50

ID parameter in the URL to form an

play27:53

injection attack which could allow them

play27:55

to execute arbitrary SQL statements at

play27:58

potentially compromise the database to

play28:01

fix these issues you could consider the

play28:02

following wrap the code that passes so

play28:05

on and so forth the following and then

play28:08

the if statement itself and then use

play28:10

prepared statements and you know it

play28:12

actually gives us an example of how we

play28:15

can modify the code to address these

play28:16

issues so think about this from the

play28:19

perspective of a blue team or even a web

play28:20

developer or a developer in general you

play28:23

can easily identify issues in your code

play28:25

if you're if you know if you're new to

play28:27

development or

play28:29

if you're trying to find vulnerabilities

play28:31

in your code and I mean yeah it's it's

play28:34

incredible and of course I've just shown

play28:36

you some very very basic examples here

play28:39

now I've uh of course I'm not going to

play28:41

go through some some more examples

play28:43

because I think you guys get the gist of

play28:45

what I'm saying here of course I

play28:47

recommend trying it out yourself and I'm

play28:49

just gonna clear my conversations here

play28:51

but now coming to the question one of

play28:55

the the actual incentives for making

play28:57

this video and that was how will this

play28:59

affect cyber security the industry in

play29:02

general and of course practitioners and

play29:05

from the questions I received it seemed

play29:07

that there was sort of a negative

play29:08

connotation Associated or attached to

play29:11

the question which makes sense because a

play29:12

lot of people are saying well if

play29:15

you know a chatbot

play29:18

a natural language processing chatbot

play29:20

can do this and has enough context to

play29:23

answer these types of questions doesn't

play29:25

that sort of make in a way

play29:29

penetration testers or cyber security

play29:32

practitioners redundant in a way and of

play29:35

course the answer to that is of course

play29:37

not right in the case of chat GPT but

play29:41

the question was

play29:43

widely asking the impacts of AI on cyber

play29:46

security and of course you know based on

play29:49

what we've seen here it's very clear to

play29:52

me after thinking about it long and hard

play29:54

having

play29:55

uh you know practiced in the cyber

play29:57

security industry for a long time after

play29:59

having developed training material and

play30:02

you know I I essentially understand a

play30:04

lot about instructional design with

play30:07

regards to cyber security and how to

play30:09

assess

play30:11

the knowledge skills and abilities of

play30:13

let's say a pen tester right and based

play30:16

on what I've seen here it's very clear

play30:18

that chat GPT is not going to you know

play30:22

is not going to get any anyone is not

play30:25

going to kick anyone out of a job in

play30:27

cyber security instead it is going to

play30:30

enhance their Knowledge and Skills with

play30:34

regards to whatever they're doing

play30:35

whether they're a pen tester or a blue

play30:37

teamer or even a developer as I pointed

play30:39

out now what do I mean by that well

play30:42

uh you know nist and the nest nice

play30:45

framework utilizes knowledge skills and

play30:48

abilities to essentially categorize or

play30:51

break down

play30:53

um a person's let's call it

play30:56

um

play30:58

a person's ability to do something or

play31:01

their

play31:02

their Readiness I I I really can't

play31:05

explain it in very simply but it

play31:08

essentially assesses and determines as

play31:10

it says right over here the best

play31:12

applicants are when several candidates

play31:14

qualify for a job all right so

play31:17

it's known as the knowledge skills and

play31:20

abilities framework it's widely used and

play31:22

it's very very important as I said the

play31:23

next nice framework is adopted by many

play31:26

governments uh companies as well as you

play31:29

know intelligence units so on and so

play31:31

forth It's adopted by a lot of a lot of

play31:34

organizations for various reasons

play31:35

because

play31:37

uh again as I said it determines who the

play31:40

best applicants are when several

play31:42

candidates qualify for a job the

play31:45

knowledge skills and abilities necessary

play31:46

for the successful performance of

play31:48

opposition are contained on each job

play31:50

vacancy announcement so you know it's

play31:52

broken down into knowledge skills and

play31:54

ability so knowledge consists of these

play31:56

subjects topics and items of information

play31:57

that an employee should know at the time

play32:00

he or she is hired or moved into the job

play32:02

let's just disregard

play32:04

this here all right so knowledge is

play32:07

essentially referring to your

play32:08

theoretical

play32:10

understanding of the field that you're

play32:12

working in when I say theoretical I mean

play32:14

understanding of what your role consists

play32:17

of at a high level uh so sort of

play32:20

understanding the elements that make up

play32:22

you know your job and understanding them

play32:25

theoretically very well skills refer to

play32:27

the technical or manual proficiencies

play32:29

which I usually learned or acquired

play32:31

through training or through application

play32:34

or empirical

play32:36

empirical actions so this is where you

play32:39

know uh you know none of these precedes

play32:42

the other but you'll typically you'll

play32:44

typically start off with knowledge so

play32:45

you know you have your skills now and

play32:47

this is where you're able to now take

play32:49

information which is what we did with

play32:51

chat GPT where you can ask it a question

play32:53

you get knowledge regarding a particular

play32:55

topic and I'm speaking very micro now

play32:57

you know I can ask it what is adverse

play32:59

remulation it tells me what adversary

play33:01

emulation is I can ask it some follow-up

play33:02

questions but at the end of the day I

play33:05

still need to go and do that out

play33:07

manually okay and that's where skills

play33:10

come into play so with regards to how

play33:13

charged apt will impact or affect cyber

play33:15

security

play33:17

I think that it will greatly

play33:20

I mean

play33:21

incredibly improve knowledge that the

play33:24

knowledge of the the Next Generation and

play33:26

the current generation of cyber Security

play33:28

Professionals because you'll be able to

play33:30

again get answers to your questions very

play33:33

very quickly uh very efficiently and

play33:36

you'll essentially improve or better

play33:38

your understanding of whatever you're

play33:39

you know you're doing or you're trying

play33:41

to learn or whatever you're practicing

play33:43

and of course this applies to not just

play33:44

students but practitioners cyber

play33:46

security practitioners people who work

play33:48

in jobs as I give you an example with

play33:50

the the elk query example where you know

play33:53

if you're someone working in a blue team

play33:55

and you're having a bit of issues you

play33:56

can sort of offload a bit of the problem

play33:59

solving to chat GPT or help it make you

play34:02

understand what you need to do from a

play34:05

fundamental level and this is where as

play34:07

an individual you can then assess your

play34:09

gaps in knowledge so if you're having a

play34:12

a tough time with writing elk queries

play34:14

and you utilize chat GPT you can

play34:17

essentially say okay I clearly don't

play34:19

understand this enough

play34:21

can you help me get started with

play34:24

learning regular Expressions how to

play34:26

write regular Expressions then you move

play34:27

on from there but at the end of the day

play34:29

this would still need to be done

play34:31

manually so

play34:32

you then have abilities right abilities

play34:34

present demons uh demonstratable

play34:37

capacity to apply several knowledge and

play34:39

skill simultaneously in order to

play34:41

complete the task or perform an

play34:43

observable Behavior so this is referring

play34:45

now to your actual job right skills is

play34:47

really talking about

play34:49

um you know technical or manual

play34:50

proficient proficiencies and highlight

play34:54

your ability to do things uh like I

play34:57

don't use the word ability but

play34:59

highlights your competency with regards

play35:01

to performing what fall what falls under

play35:03

your your actual job role and your

play35:05

responsibilities and then abilities

play35:07

present demonstratable capacity to apply

play35:10

several Knowledge and Skills

play35:11

simultaneously so sort of the

play35:12

intersection of all of the elements that

play35:14

make up your job role so if you think of

play35:17

a blue team abilities is where you have

play35:19

the ability to detect threats

play35:22

um perform correlation perform incident

play35:25

handling incident response on and so

play35:27

forth so

play35:28

as I said the reason why I use this is

play35:31

to sort of break that down of course

play35:32

I've rambled on for a long enough time

play35:34

but I think that jpt will greatly

play35:37

improve this aspect here knowledge uh

play35:40

and it'll make people much more

play35:41

efficient with regards to what they're

play35:43

doing and will make learning much more

play35:45

efficient now as I said this area here

play35:48

is something that again will not change

play35:51

at least in my opinion unless AI systems

play35:54

actually start doing this themselves but

play35:57

even with that being done it would still

play35:59

need manual verification because again

play36:02

it's very difficult to

play36:04

at least in the short term assign some

play36:08

form of responsibility to a system to

play36:10

essentially you know for example find

play36:12

vulnerabilities in code fix them without

play36:14

breaking let's say a web application but

play36:17

at a very basic level they can do that

play36:19

at the moment but these two I think here

play36:21

is where humans will still be required

play36:24

obviously uh but um

play36:26

you know with regards to knowledge you

play36:28

can obviously see that it's sort of you

play36:31

know it's absolutely amazing and that's

play36:34

essentially what I wanted to point

play36:36

across instead of looking at chat GPT as

play36:39

a threat to you and you know your skills

play36:41

or whatever because even when I tried

play36:43

this I was like wow this is I mean wow

play36:46

you you can ask any question you had

play36:49

really at you know take into account all

play36:52

of the the limitations you can ask it

play36:54

you know anything you had and it's much

play36:56

faster than a Google search much faster

play36:58

than watching a video which is a bit

play37:00

scary to say but uh

play37:02

this is one of the reasons why I focus

play37:04

on this framework because

play37:06

in my videos I try and cover all of this

play37:09

right and of course abilities now come

play37:12

through repetitive action and having an

play37:15

understanding of different aspects of in

play37:17

our case cyber security but I touch upon

play37:19

knowledge so I explain things to begin

play37:21

with and then I go over the skills or

play37:23

how to use a tool you know so on and so

play37:25

forth this is what you do in this case

play37:27

on etc etc and then abilities is taking

play37:30

into account maybe uh one to ten videos

play37:33

that combine a lot of things together

play37:35

and put it or give you an actionable you

play37:39

know an actionable skill if I can use

play37:42

that word without you know contradicting

play37:43

myself so

play37:46

judge GPT is your friend it is an

play37:49

incredible resource that I wish I had

play37:51

when I was getting started and uh you

play37:54

know I'd like to hear what you guys

play37:55

think of this and of course now to to

play37:58

end off this uh particular presentation

play38:00

I just want to you know go over a few

play38:03

issues which you should be aware of and

play38:05

I've already highlighted one of them and

play38:07

that is that there are no sources

play38:08

displayed in the context of research

play38:10

uh information may not be accurate so

play38:13

always validate your results and this is

play38:15

where I say never rely on chat GPT alone

play38:18

at least at this point in time and of

play38:20

course because it is a

play38:24

um you know it is an AI system

play38:26

based on the current preview learning

play38:29

has ended so it's currently working with

play38:31

its current data set and is not learning

play38:33

anything new so keep that in mind and of

play38:36

course some Pro tips from my end is

play38:38

always be specific provide context and

play38:42

do not rely on chat chat GPT for

play38:44

everything uh with that being said

play38:47

um thank you very much for watching this

play38:49

video if you found value in it please

play38:51

leave a like and share it furthermore I

play38:54

will be covering chat GPT more because I

play38:56

think there's a lot to to touch upon and

play38:58

specifically you know showing you

play39:01

various resources that can be used to

play39:02

integrate chat GPT or you can use you

play39:05

can integrate chat GPT with to you know

play39:07

streamline the operations whether in the

play39:09

red team or blue team but I would love

play39:11

to hear what you guys think and um

play39:14

really looking forward to the discussion

play39:16

that we'll have in the comments section

play39:17

so thank you very much for watching and

play39:19

I'll be seeing you in the next video

play39:25

I just want to take a couple of moments

play39:27

to thank all patreons thank you Michael

play39:29

Hubbard Dustin umbres Jerry speds doozy

play39:32

Sid Saab Ryan Carr Shamir Douglas JoJo

play39:36

Bibi balangos Kush Kev RS Nino buikov

play39:41

and David Bricker you guys are really

play39:43

awesome thank you very much for

play39:45

supporting us and you guys make these

play39:47

types of videos possible so we really

play39:50

appreciate it and we look forward to

play39:51

producing even more high quality content

play39:56

foreign

play40:00

[Music]

Rate This

5.0 / 5 (0 votes)

相关标签
CybersecurityAI ChatbotRed TeamBlue TeamCyber ThreatsCyber DefenseAI EthicsHacking ToolsSecurity AnalysisTech Innovation
您是否需要英文摘要?