Domain overview
Advanced surfaces are where offensive work becomes more architecture-aware. Cloud identity, API object models, mobile runtime control, federation, build pipelines, model-facing systems and industrial protocols all require different questions, tooling and reporting language from standard web or internal assessments.
Related certification context
These certifications map to parts of the specialist surface collected here.
- OffSec OSAI+ / AI-300Dedicated AI red teaming across LLMs, agents and AI infrastructure.
- OffSec OSWE / WEB-300Useful for API- and source-guided exploitation in complex web-backed systems.
- OffSec OSEP / PEN-300Useful for mature operator workflow where specialist targets intersect with internal operations.
Curated public references
- OWASP API Securityowasp.org/www-project-api-security/
- OWASP MASmas.owasp.org/
- OWASP API Security Top 10 2023owasp.org/API-Security/editions/2023/en/0x00-header/
- OWASP MAS · MASVSmas.owasp.org/MASVS/
- PortSwigger · JWTportswigger.net/web-security/jwt
- Frida Documentationfrida.re/docs/home/
- GitHub · MobSF / Mobile-Security-Framework-MobSFgithub.com/MobSF/Mobile-Security-Framework-MobSF
- Microsoft Learn · Exchangelearn.microsoft.com/en-us/exchange/
- PX4 Documentationdocs.px4.io/
- MAVLink Developer Guidemavlink.io/en/
- ArduPilot Developer Documentationardupilot.org/dev/
Domain index
Cloud Offensive Security
Provider control planes, workloads, Kubernetes, cloud identities and automation abuse.
API Security
REST, GraphQL, JWT, OAuth/OIDC, BOLA/BFLA and endpoint fuzzing.
Mobile App Pentesting
Android/iOS testing, Frida, TLS pinning, deep links and mobile reversing.
Identity / Entra / Okta / SSO Abuse
Tokens, consent, tenant drift, SCIM, federation and conditional-access testing.
Adversary Emulation / Tradecraft
OPSEC, payload staging, AV/EDR pressure, C2 and client-side chains.
DevSecOps / Supply Chain / CI-CD
Repos, runners, package trust, signing, SBOM and build paths.
OT / ICS Security
Industrial protocols, PLC/HMI trust and process-level impact.
AI Security
Prompt injection, agents, tool misuse, retrieval abuse and offensive AI ops.
Drone / Robotics Security
MAVLink, ROS, telemetry abuse, companion computers and field autonomy.
