У нас вы можете посмотреть бесплатно I Left an AI Hacker Alone for 1 Hour and This Happened… | Cybersecurity Lab Idea или скачать в максимальном доступном качестве, видео которое было загружено на ютуб. Для загрузки выберите вариант из формы ниже:
Если кнопки скачивания не
загрузились
НАЖМИТЕ ЗДЕСЬ или обновите страницу
Если возникают проблемы со скачиванием видео, пожалуйста напишите в поддержку по адресу внизу
страницы.
Спасибо за использование сервиса ClipSaver.ru
🤖 Tool Used (FREE): https://github.com/KeygraphHQ/shannon... What happens if you give an AI a vulnerable application and let it hack completely on its own? In this video, I test an autonomous AI pentesting agent called Shannon by Keygraph. I give it a target, walk away, and let it perform reconnaissance, exploitation, and reporting without any manual hacking. The AI runs for over an hour and generates a full professional penetration testing report with real findings. ===================================================== ⚠️ DISCLAIMER This demo is performed ONLY on an intentionally vulnerable application running locally in a lab environment. Do NOT attempt this on real websites or systems. Unauthorized hacking is illegal. This video is for educational purposes only. ===================================================== 🧪 Target Application: OWASP Juice Shop (intentionally vulnerable web application) 🛠️ High-Level Steps: Run OWASP Juice Shop locally using Docker Build Shannon as a Docker image Run Shannon against the target Analyze the final AI-generated pentest report If you’re learning cybersecurity, pentesting, or curious about how AI is changing security, this is for you. ======================================================== Commands: Step 1: Verify Docker Works docker run hello-world Step 2: Run OWASP Juice Shop (Target App) docker run --rm -p 3000:3000 bkimminich/juice-shop Step 3: Open in browser: http://localhost:3000 Step 4: Clone Shannon (AI Pentesting Agent) git clone https://github.com/KeygraphHQ/shannon... cd shannon Step 5: Build Shannon Docker Image docker build -t shannon:latest . Step 6: Create Required Folders mkdir repos mkdir configs Step 7: Set Your Claude Code Token set CLAUDE_CODE_OAUTH_TOKEN=PASTE_YOUR_TOKEN_HERE Step 8: Run Shannon Against Juice Shop docker run --rm -it ^ --network host ^ --cap-add=NET_RAW ^ --cap-add=NET_ADMIN ^ -e CLAUDE_CODE_OAUTH_TOKEN="%CLAUDE_CODE_OAUTH_TOKEN%" ^ -e CLAUDE_CODE_MAX_OUTPUT_TOKENS=64000 ^ -v "%cd%\repos:/app/repos" ^ -v "%cd%\configs:/app/configs" ^ shannon:latest ^ "http://localhost:3000" ^ "/app/repos/juice-shop" ⏳ Expected runtime: ~1 to 1.5 hours Step 9: View the Final Report After the run completes, Shannon generates a pentest report file (usually in the project folder or inside deliverables/). List files: dir Step 10: Open the report: notepad comprehensive_security_assessment_report.md ======================================================== Video Content: 00:00 - Intro 00:55 - Video Content 02:25 - Setup 03:00 - Setting Vuln Target 04:20 - Setting Attacker 05:08 - Start Pentest 06:45 - Report 08:32 - My thoughts 10:20 - Concerns about AI 12:25 - Next steps... ======================================================== 📌 Schedule 1:1 call with me: https://topmate.io/meeratamboli 📌 Connect with me on Linkedin: / meeratamboli 📌 Connect with me on Instagram: / meeratamboli_ 📌 Cyber Career Starter Guide - Top 100 Concepts To Learn: https://topmate.io/meeratamboli/16750... ==================================================== #CyberSecurity #EthicalHacking #Pentesting #AIinCyberSecurity #AIPentesting #CyberSecurityBeginners #BugBounty #InfoSec #OWASP #JuiceShop #AIHacking #Docker #SecurityTools DISCLAIMER: Everything I share here is based on my personal views and experiences, not connected to any employer, role or organisation.