From the course: CompTIA SecAI+ (CY0-001) Cert Prep

Unlock this course with a free trial

Join today to access over 25,300 courses taught by industry experts.

Reconnaissance

Reconnaissance

Large language models excel at collecting and summarizing vast amounts of open-source information, so it's no surprise that threat actors now rely on generative AI during the earliest reconnaissance stages of an intrusion. Instead of manually searching through LinkedIn, GitHub, press releases, and breach dumps, attackers can now feed their raw data into an LLM that identifies key personnel at a target organization, finds exposed credentials, and identifies vulnerable infrastructure. The model can then output tailored questions for further searching, draft spear-phishing pretext material, or highlight high-value business units, all in minutes instead of days. State-sponsored groups have already embraced this approach. A recent threat intelligence briefing revealed that some international operators were using Google's Gemini Assistant for researching potential infrastructure and reconnaissance on target organizations. This type of activity significantly speeds up target profiling. For…

Contents