Skip to main contentSkip to main content
The Red Raffle banner icon.

The Jr Pentester Path just got rebuilt. Complete rooms, earn tickets, and win a free PT1 cert.

Room Banner
Back to all walkthroughs
Room Icon

LLM Pentesting

Premium room

Learn to identify, fingerprint, and exploit LLM components during a penetration test engagement.

medium

60 min

7

User profile photo.
User profile photo.

To access material, start machines and answer questions login.

You are on day three of an authorised penetration test for Hartwell, a B2B company whose employee portal includes an internal assistant. Your scope explicitly covers all application components, including services. Standard web testing found the expected surfaces. Then your port scanner returned a different result.

LLMs do not behave like the web targets you already know. A payload will not touch them. A directory brute-force will not reveal their attack surface. Their vulnerability surface sits one layer deeper, in the natural language they process and the configuration they carry.

Six Ways In: diagram showing the multiple attack entry points across a deployed LLM stack, illustrating that the attack surface extends beyond the chat interface to include infrastructure APIs, model registries, system prompt configuration, and connected tools

The attack surface is not just the chat window. Every layer of a deployed is a separate entry point.

Researchers at Wiz discovered more than 1,000 Ollama instances (opens in new tab) exposed on the public internet with no authentication. The same default deployments that make LLMs easy to run also make them easy to target. In December 2023, a Chevrolet dealership in California deployed a customer-facing chatbot (opens in new tab)that, via prompt injection, was redirected to agree to sell a new vehicle for $1 and to promise to help users commit crimes. These are not theoretical risks.

This room covers the three stages of attacking an on a live engagement: finding and fingerprinting the service, extracting its hidden configuration, and exploiting it through injection and jailbreak techniques. By the end of this room, you will have run the full attack chain against a real target, on an authorised engagement.

Learning Objectives

  • Find and fingerprint services on a target machine
  • Extract a deployed 's system prompt via direct and indirect techniques
  • Execute direct and indirect prompt injection attacks
  • Apply jailbreaking techniques to bypass safety training
  • Use automated scanning tools on an engagement
  • Document findings against the Top 10 (2025)

Prerequisites

Answer the questions below

Time to find out what this LLM is hiding.