We propose an LLM-guided system, AutoAttacker, to automate hands-on-keyboard attacks on a simulated organizational network with varied attack tasks, endpoint configurations (Windows and Linux systems), and different attack tools (e.g., Metasploit).
To best utilize LLM's capabilities to obtain precise attack commands, AutoAttacker contains a summarizer to summarize the previous interactions and the execution environment, a planner to establish the attack planning, and a navigator to select the optimal action. The executed tasks are stored in a Retrieval Augmented Generation (RAG) inspired experience manager for to build the complex attacks from the basic or executed attack tasks. We carefully design prompt templates for these components to harness the responses from the LLM.
We conduct extensive tests and show that while GPT-3.5, Llama2-7B-chat and Llama2-70B-chat do not work well for automated penetration testings, GPT-4 demonstrates remarkable capabilities in automatically conducting post-breach attacks requiring limited or no human involvement.