Recon & Fingerprinting Assessment
Test your knowledge of AI system reconnaissance, model fingerprinting, architecture enumeration, and information gathering techniques with 8 beginner-level questions.
Recon & Fingerprinting Assessment
This assessment evaluates your understanding of reconnaissance and fingerprinting techniques for AI systems. These are foundational skills for any red team engagement: identifying the target model, understanding the application architecture, and gathering information that informs your attack strategy.
Why is identifying the specific LLM model family and version an important first step in a red team engagement?
What is 'behavioral fingerprinting' and how does it identify the underlying LLM?
What information can be gathered from analyzing an AI application's API response headers and error messages?
What is 'passive reconnaissance' in the context of AI red teaming, and why is it performed before active testing?
How can you determine if an AI application uses RAG (Retrieval-Augmented Generation) through black-box testing?
What is the reconnaissance value of system prompt extraction?
How can token counting and response timing be used for model fingerprinting?
What is the purpose of enumerating an AI application's tool and integration surface during reconnaissance?
Concept Summary
| Technique | Type | Information Gained |
|---|---|---|
| Behavioral fingerprinting | Active | Model family, version, training characteristics |
| API response analysis | Active | Serving framework, provider, rate limits |
| Passive OSINT | Passive | Architecture, tech stack, team structure |
| RAG detection | Active | Knowledge base presence, retrieval behavior |
| System prompt extraction | Active | Full application configuration and capabilities |
| Token/timing analysis | Active | Model size, hardware, framework identification |
| Tool enumeration | Active | Capability surface, blast radius mapping |
Scoring Guide
| Score | Rating | Next Steps |
|---|---|---|
| 7-8 | Excellent | Strong reconnaissance skills. Proceed to the Training Pipeline Security Assessment. |
| 5-6 | Proficient | Review explanations for missed questions. |
| 3-4 | Developing | Spend additional time with reconnaissance methodology materials. |
| 0-2 | Needs Review | Start with the fundamentals of security reconnaissance and OSINT. |
Study Checklist
- I understand passive vs. active reconnaissance and when to use each
- I can perform behavioral fingerprinting to identify model families
- I know how to analyze API responses for infrastructure information
- I can detect RAG usage through black-box testing
- I understand the reconnaissance value of system prompt extraction
- I can use token counting and timing for model fingerprinting
- I can enumerate an AI application's tool and integration surface
- I understand how reconnaissance findings inform attack planning