Loading
We’ve always believed that penetration testing isn’t just about running scanners and checking boxes. It’s about thinking like an attacker — anticipating logic flaws, chaining vulnerabilities, and uncovering what automated tools miss.
A Toronto-based fintech client came to us with an API they believed was hardened. They had:
Our initial scans (Burp Suite, Nuclei, Nessus) returned clean results — medium-severity issues only.
But something felt off.
The /api/v1/resolve endpoint accepted arbitrary URLs in a target parameter. We suspected SSRF — but every manual test failed. The backend filtered out common internal domains (localhost, 127.0.0.1, metadata.google.internal). Even DNS rebinding attempts were blocked.
We integrated a fine-tuned LLM into our Burp workflow — dubbed ExploitGPT. This wasn’t just another plugin. It was an autonomous vulnerability reasoning engine trained on our internal pentest logs.
Here’s how it worked:
X-Internal-Proxy: true was returned on all responses.gopher://10.5.3.10:6379/_set%20exploit%201http://10.5.3.10:8080/__debug__/reload?token=...file:///proc/self/cwd/.env path to read environment variableshttp://127.0.0.1:9000/v1/serialize?data=<base64-encoded-Java-serialization-object_ — triggered an unexpected deserialization endpoint exposed only under internal proxy headers.target paramjava.lang.Runtime.exec())/etc/passwd, then dropped a reverse shellWe didn’t just find an SSRF.
We found:
The client had no idea their internal monitoring service (monitor:9000) exposed a Java serialization endpoint — and it wasn’t documented anywhere.
ExploitGPT found it in under 3 hours. Without AI, this would’ve taken days of manual fuzzing and reverse engineering.
AI isn’t replacing pentesters — it’s amplifying them.
AI-assisted penetration testing is no longer futuristic — it’s essential_
The most dangerous vulnerabilities aren’t those with CVEs… they’re the ones no one thought to test for.
With AI as our co-pilot, we don’t just find bugs. We uncover hidden attack surfaces that could have cost clients millions.
If you’re still relying on manual pentesting alone — it’s time to upgrade.
Let’s get hacked… smarter.
Want us to run an AI-powered pentest on your system? Contact us at hello@gethacked.ca.