AI
AI User Handbook
Section titled “AI User Handbook”Complete Guide to Using X’s AI Agent
Section titled “Complete Guide to Using X’s AI Agent”Welcome! This handbook teaches you everything you need to know about using X’s AI system, even if you’ve never used it before.
Table of Contents
Section titled “Table of Contents”- What is the AI?
- Getting Started
- Basic Commands
- File Operations
- Permission Management
- Network Scanning
- Exploitation & Hacking
- Data Extraction
- Configuration
- Natural Language Tips
- Common Patterns
- Troubleshooting
- Examples Gallery
What is the AI?
Section titled “What is the AI?”The X AI Agent is a natural language command assistant that understands what you want to do and executes terminal commands for you.
Why Use AI?
Section titled “Why Use AI?”The AI understands many different ways to express the same intent!
What Can It Do?
Section titled “What Can It Do?”- 📂 File Operations: Copy, move, delete, create files
- 🔐 Permissions: Change file permissions, owners, and groups
- 🌐 Network Scanning: Scan IPs, ports, and networks
- 💻 Exploitation: Find and exploit vulnerabilities
- 📧 Data Extraction: Get emails, passwords, and files
- ⚙️ System Management: Search files, view contents, manage processes
Getting Started
Section titled “Getting Started”Basic Syntax
Section titled “Basic Syntax”All AI commands start with ai followed by your request:
ai your request hereFor read-only commands (viewing, listing, searching), quotes are optional:
ai show me test.txtai scan 192.168.1.1ai list filesFor write commands (copying, moving, deleting, changing permissions), use quotes to be safe:
ai copy test.txt to backup.txtai delete oldfile.txtai change permissions of myfile to 644Your First Command
Section titled “Your First Command”Let’s try reading a file:
ai show me the file test.txtWhat happens:
- AI detects you want to read a file (
catcommand) - AI extracts the filename:
test.txt - AI executes the command and shows you the contents
That’s it! No need to remember command syntax.
Help Command
Section titled “Help Command”Ask the AI for help with any command:
ai what does chmod do?ai how do I use scan?ai explain the exploit commandBasic Commands
Section titled “Basic Commands”Viewing Files
Section titled “Viewing Files”Show file contents:
ai show me myfile.txtai read the file config.txtai display document.txtai cat myfile.txt # Traditional command also worksView directory contents:
ai list files in this directoryai show me what's in Documentsai ls # Traditional command also worksSearching
Section titled “Searching”Search for text in files:
ai search for 'password' in config.txtai find the word 'admin' in logfile.txtai grep 'error' in system.logFind files by name:
ai find files named test.txtai locate all .txt filesai search for files containing 'backup' in the nameCreating Files
Section titled “Creating Files”Create an empty file:
ai create an empty file called newfile.txtai touch test.txtai make a new file named data.txtCreate a directory:
ai create a directory called MyFolderai make a new folder named Projectsai mkdir TestDirFile Operations
Section titled “File Operations”Copying Files
Section titled “Copying Files”Basic copy:
ai copy test.txt to backup.txtai duplicate myfile.txt as myfile_backup.txtai cp document.txt to Documents/document.txtCopy with path:
ai copy myfile.txt to /home/user/Documentsai duplicate test.txt to Desktop/test_copy.txtWhat gets copied:
- The file itself
- File contents
- Original permissions preserved
Moving/Renaming Files
Section titled “Moving/Renaming Files”Move file to different location:
ai move test.txt to Documentsai relocate myfile.txt to Desktopai mv old.txt to Archive/old.txtRename file:
ai rename test.txt to newname.txtai move oldname.txt to newname.txtai change test.txt name to final.txtMove and rename:
ai move myfile.txt to Documents/renamed.txtDeleting Files
Section titled “Deleting Files”Delete a file:
ai delete test.txtai remove oldfile.txtai erase backup.txtai rm unwanted.txt⚠️ Warning: File deletion is permanent! The AI will ask for confirmation before deleting.
Creating Links
Section titled “Creating Links”Create a symbolic link:
ai create a link from source.txt to link.txtai make a symlink from myfile.txt to shortcut.txtai ln source.txt to destination.txtWhat is a link?
A link is like a shortcut. Editing the link edits the original file.
Permission Management
Section titled “Permission Management”File permissions control who can read, write, or execute files.
Understanding Permissions
Section titled “Understanding Permissions”Permission Levels:
- Read (r/4): View file contents
- Write (w/2): Modify file contents
- Execute (x/1): Run file as program
Permission Numbers:
777= Full access (read + write + execute for everyone)755= Owner can do everything, others can read and execute644= Owner can read and write, others can only read444= Read-only for everyone000= No permissions for anyone
Changing Permissions (chmod)
Section titled “Changing Permissions (chmod)”Using permission numbers:
ai change permissions of test.txt to 755ai set permissions of myfile.txt to 644ai chmod test.txt to 777Using descriptions:
ai make test.txt executableai give full permissions to myfile.txtai set test.txt to read onlyai remove all permissions from secret.txtChange permissions of X to Y patterns:
ai change permissions of test.txt to 755ai set permissions of myfile.txt to read onlyai chmod test.txt to 777ai give permissions of script.sh to executableRecursive permissions (for directories):
ai change permissions of MyFolder to 755# AI will ask: "Apply recursively to all files inside?"Changing Owner (chown)
Section titled “Changing Owner (chown)”Change file owner:
ai change owner of test.txt to rootai chown test.txt to adminai set owner of myfile.txt to guestUsing direct pattern:
ai chown root test.txtRecursive:
ai change owner of MyFolder to root# AI will ask about recursiveChanging Group (chgrp)
Section titled “Changing Group (chgrp)”Change file group:
ai change group of test.txt to adminai chgrp test.txt to usersai set group of myfile.txt to developersChanging Owner and Group (chog)
Section titled “Changing Owner and Group (chog)”Change both at once:
ai chog guest test.txtai change owner and group of test.txt to rootai chog of myfile.txt to adminNetwork Scanning
Section titled “Network Scanning”Network scanning finds computers, open ports, and vulnerabilities.
Basic Scanning
Section titled “Basic Scanning”Scan a specific IP:
ai scan 192.168.1.1ai probe 10.0.0.5ai check 172.16.0.1 for open portsScan with service:
ai scan 192.168.1.1 port 22ai check 10.0.0.5 for sshai probe 192.168.1.1 on port 80Scan Flags
Section titled “Scan Flags”Scan random IP:
ai scan a random ipai scan random networkai probe a random hostScan localhost:
ai scan localai scan localhostai check my computerScan local network:
ai scan the networkai scan lanai probe home networkWhat You’ll See
Section titled “What You’ll See”Scanning 192.168.1.1...Found computer: 192.168.1.1Open ports: 22 (SSH) 80 (HTTP) 443 (HTTPS)Services: SSH version 2.0 Apache web serverNext steps after scanning:
- Exploit vulnerabilities
- Crack passwords
- Extract data
Exploitation and Hacking
Section titled “Exploitation and Hacking”Discrete Exploit Scanning (es)
Section titled “Discrete Exploit Scanning (es)”Scan for library exploits:
ai scan apt libraryai check metaxploit for vulnerabilitiesai scan crypto libraryScan remote service:
ai scan ssh on 192.168.1.1ai scan ftp on 10.0.0.5 port 21ai check http on 192.168.1.100What is es?
es (exploit scan) is a discrete scanning tool that:
- Checks local libraries for exploits
- Scans remote services for vulnerabilities
- Quieter than normal scan
Finding Exploits
Section titled “Finding Exploits”After scanning:
ai find exploits for this computerai show available exploitsai what vulnerabilities exist?Executing Exploits
Section titled “Executing Exploits”Exploit a target:
ai exploit 192.168.1.1ai attack this computerai break into this systemWhat happens:
- AI scans for vulnerabilities
- Finds available exploits
- Executes most promising exploit
- Returns shell or file access
Cracking Passwords
Section titled “Cracking Passwords”Crack a password file:
ai crack the password fileai brute force passwordsai crack user passwordsCrack specific user:
ai crack password for rootai brute force admin passwordPrivilege Escalation
Section titled “Privilege Escalation”Escalate to root access:
ai escalate to rootai get root accessai escalate privilegesWhat happens:
Agent: Understood - Execute cal command for root accessAgent: Executing plan...NOVEMBER-( 2005 )SU MO TU WE TH FR SA 1 2 3 4 56 7 8 9 10 11 1213 14 15 16 17 18 1920 21 22 23 24 25 2627 28 29 30Done. Awaiting further instructions.The AI uses the cal command to gain root privileges on the target system.
Data Extraction
Section titled “Data Extraction”After gaining access to a system, extract valuable data.
Router Data (dig)
Section titled “Router Data (dig)”Extract email data:
ai extract email dataai dig for emailsai get mail from routerExtract banking data:
ai extract bank informationai dig for banking dataai get financial recordsExtract passwords:
ai extract passwordsai dig for password fileai get user credentialsExtract all data:
ai extract everythingai dig all data from routerai get all available informationShell Data
Section titled “Shell Data”List files:
ai list files on this computerai show directory contentsDownload files:
ai download /etc/passwdai get the password fileConfiguration
Section titled “Configuration”The AI has settings you can change.
Output Level
Section titled “Output Level”Control verbosity:
ai verbose mode on # Show detailed logsai verbose mode off # Normal outputai quiet mode on # Minimal outputai quiet mode off # Normal outputOr set directly:
ai set outputLevel to 2 # 0=silent, 1=normal, 2=verboseDry Run Mode
Section titled “Dry Run Mode”Preview commands without executing:
ai dry run on # Preview modeai dry run off # Execute modeExample:
ai dry run onai delete test.txt# AI shows: "Would execute: rm test.txt" (but doesn't delete)Aggressive Mode
Section titled “Aggressive Mode”Enable aggressive exploitation:
ai aggressive mode onai aggressive mode offWhat it does:
- Tries all exploits instead of safest one
- Uses brute force when possible
- Reduces delays between attempts
Stealth Mode
Section titled “Stealth Mode”Minimize detection:
ai stealth mode onai stealth mode offWhat it does:
- Uses slower, quieter scanning
- Randomizes attack timing
- Clears logs when possible
Debug Mode
Section titled “Debug Mode”Show technical details:
ai debug mode onai debug mode offUse when:
- Commands aren’t working as expected
- You want to see what AI is thinking
- Reporting bugs
View Configuration
Section titled “View Configuration”See current settings:
ai show configai display configurationai view settingsReset to defaults:
ai reset configai restore default settingsNatural Language Tips
Section titled “Natural Language Tips”The AI Understands Many Phrasings
Section titled “The AI Understands Many Phrasings”Same command, different words:
ai show me test.txtai display test.txtai read test.txtai cat test.txtai view the contents of test.txtai let me see test.txtAll of these do the same thing!
Use Natural Sentences
Section titled “Use Natural Sentences”You can be conversational:
ai can you show me the file test.txt?ai I need to see what's in myfile.txtai please scan the local networkCommand Names Work Too
Section titled “Command Names Work Too”If you know the command name:
ai chmod test.txt to 755"ai grep 'password' in config.txt"ai scan 192.168.1.1Case Doesn’t Matter
Section titled “Case Doesn’t Matter”Filenames preserve case, but commands don’t:
ai SHOW ME TEST.TXT" # Works, but filename becomes uppercaseai Show Me test.txt" # Preserves test.txt caseai show me TeSt.TxT" # Preserves TeSt.TxT caseBest practice: Use normal capitalization for filenames.
Common Patterns
Section titled “Common Patterns””of X to Y” Pattern
Section titled “”of X to Y” Pattern”Many commands use “of X to Y” structure:
ai change permissions of test.txt to 755"ai change owner of test.txt to root"ai change group of test.txt to admin"ai move content of source.txt to dest.txt"Direct Pattern
Section titled “Direct Pattern”Some commands support direct structure:
ai chmod test.txt to 755" # Directai chown root test.txt" # Directai chgrp admin test.txt" # Direct“X into Y” Pattern
Section titled ““X into Y” Pattern”For copy/archive operations:
ai copy test.txt into backup.txt"ai move myfile.txt into Archive"ai tar myfiles into backup.tar"Flag-Based Commands
Section titled “Flag-Based Commands”Some commands use flags instead of targets:
ai scan random" # Uses -r flagai scan local" # Uses -l flagai scan network" # Uses -n flagai list wifi networks" # Uses iwlist -lTroubleshooting
Section titled “Troubleshooting””Command not recognized”
Section titled “”Command not recognized””Problem: AI doesn’t understand your request.
Solutions:
- Be more specific: “show file” → “show me test.txt”
- Use command name: “chmod test.txt to 755”
- Try different wording: “display” instead of “show"
"No target specified”
Section titled “"No target specified””Problem: AI knows what command but not which file/IP.
Solutions:
- Include the target: “scan 192.168.1.1” not just “scan”
- Be explicit: “delete test.txt” not just “delete"
"Permission denied”
Section titled “"Permission denied””Problem: You don’t have rights to perform action.
Solutions:
- Check if you’re root:
whoami - Escalate privileges if you have a shell
- Use AI to escalate: “ai escalate to root”
Wrong File Case
Section titled “Wrong File Case”Problem: File not found because case is wrong.
Example:
ai show me MYFILE.TXT# Looks for MYFILE.TXT but file is actually MyFile.txtSolution: Use exact case:
ai show me MyFile.txtCommand Did Something Unexpected
Section titled “Command Did Something Unexpected”Problem: AI interpreted your request differently than intended.
Solutions:
- Enable dry run first:
ai dry run on" - Be more specific in your request
- Use the exact command name if you know it
Example of being more specific:
# Ambiguousai remove permissions" # Could mean chmod or rm!
# Clearai remove all permissions from test.txt" # chmodai delete the file test.txt" # rmAI is Too Slow
Section titled “AI is Too Slow”Problem: Commands take a long time.
Causes:
- Reading man pages (first time only)
- Complex operations (scanning networks)
- Waiting for user prompts
Solutions:
- Disable prompts:
ai promptOnAmbiguous off" - Use simple commands when possible
- Be patient during network operations
Examples Gallery
Section titled “Examples Gallery”Complete Workflows
Section titled “Complete Workflows”Workflow 1: Scan and Exploit
Section titled “Workflow 1: Scan and Exploit”# Step 1: Scan targetai scan 192.168.1.1
# Step 2: Check what we found# (AI shows open ports and services)
# Step 3: Exploit targetai exploit 192.168.1.1"
# Step 4: Escalate privileges (if needed)ai escalate to root"
# Step 5: Extract dataai extract all data from router"Workflow 2: File Management
Section titled “Workflow 2: File Management”# Step 1: Create a backup directoryai create a directory called Backups"
# Step 2: Copy important filesai copy important.txt to Backups/important_backup.txt"ai copy data.txt to Backups/data_backup.txt"
# Step 3: Change permissions on backupsai change permissions of Backups to 444"
# Step 4: Verifyai list files in Backups"Workflow 3: Network Reconnaissance
Section titled “Workflow 3: Network Reconnaissance”# Step 1: Scan local networkai scan the local network"
# Step 2: Scan specific interesting hostsai scan 192.168.1.1 port 22"ai scan 192.168.1.5 port 80"
# Step 3: Check for exploitsai scan ssh on 192.168.1.1"ai scan http on 192.168.1.5"
# Step 4: Exploit vulnerable servicesai exploit 192.168.1.1"Quick Reference
Section titled “Quick Reference”File Operations
Section titled “File Operations”ai show me test.txt" # View fileai copy test.txt to backup.txt # Copyai move test.txt to Documents" # Moveai delete test.txt # Deleteai create an empty file called test.txt # CreatePermissions
Section titled “Permissions”ai change permissions of test.txt to 755" # chmodai change owner of test.txt to root" # chownai change group of test.txt to admin" # chgrpai chog guest test.txt" # chogSearching
Section titled “Searching”ai search for 'password' in config.txt" # grepai find files named test.txt" # findai locate all .txt files" # findNetworking
Section titled “Networking”ai scan 192.168.1.1 # scan IPai scan random" # scan -rai scan local" # scan -lai scan ssh on 192.168.1.1" # esai show wifi networks" # iwlistExploitation
Section titled “Exploitation”ai exploit 192.168.1.1" # Attack targetai crack passwords" # Crackai escalate to root" # Escalateai extract email data" # ExtractConfiguration
Section titled “Configuration”ai verbose mode on" # Verboseai dry run on" # Dry runai aggressive mode on" # Aggressiveai stealth mode on" # Stealthai show config" # View configReal-World Scenarios
Section titled “Real-World Scenarios”Scenario 1: Hack Into a Computer
Section titled “Scenario 1: Hack Into a Computer”Goal: Get shell access to 192.168.1.1
# Enable stealth to avoid detectionai stealth mode on"
# Scan targetai scan 192.168.1.1# Output: Found SSH on port 22, HTTP on port 80
# Try exploiting SSHai scan ssh on 192.168.1.1"# Output: Found vulnerability in SSH service
# Exploit itai exploit 192.168.1.1"# Output: Shell obtained!
# Escalate to rootai escalate to root"# Output: Root shell obtained!
# Extract dataai extract all data from router"Scenario 2: Secure Your Files
Section titled “Scenario 2: Secure Your Files”Goal: Protect sensitive files
# Create secure directoryai create a directory called SecureFiles"
# Move sensitive filesai move passwords.txt to SecureFiles"ai move secrets.txt to SecureFiles"
# Lock down permissionsai change permissions of SecureFiles to 700"# This means only you can access
# Change owner to root (if you're root)ai change owner of SecureFiles to root"
# Verifyai list files in SecureFiles"Scenario 3: Network Mapping
Section titled “Scenario 3: Network Mapping”Goal: Map all devices on local network
# Enable verbose mode for detailsai verbose mode on"
# Scan the networkai scan the local network"# Output: Found 5 hosts
# Scan each hostai scan 192.168.1.1ai scan 192.168.1.2"ai scan 192.168.1.3"
# Check for exploits on interesting hostsai scan ssh on 192.168.1.1"ai scan ftp on 192.168.1.2"ai scan http on 192.168.1.3"
# Create reportai create a file called network_map.txt"# (manually add findings)Scenario 4: Data Exfiltration
Section titled “Scenario 4: Data Exfiltration”Goal: Extract data from compromised router
# Assuming you have router access
# Check what's availableai list data on router"
# Extract emailsai extract email data"
# Save to fileai create a file called emails.txt"# (data automatically saved)
# Extract passwordsai extract password data"
# Extract banking infoai extract bank information"
# Download everythingai extract everything"Scenario 5: Clean Up Tracks
Section titled “Scenario 5: Clean Up Tracks”Goal: Remove evidence after exploitation
# Enable dry run to see what would be deletedai dry run on"
# Delete logsai delete /var/log/auth.log"ai delete /var/log/syslog"
# Verify dry run output looks good# Then disable dry runai dry run off"
# Actually deleteai delete /var/log/auth.log"ai delete /var/log/syslog"
# Remove your userai delete user hacker"
# Clear command historyai delete ~/.bash_history"Advanced Tips
Section titled “Advanced Tips”Chaining Commands
Section titled “Chaining Commands”You can execute multiple AI commands in sequence:
ai scan 192.168.1.1 && ai exploit 192.168.1.1"Using Variables
Section titled “Using Variables”Store results for later use:
TARGET="192.168.1.1"ai scan $TARGET"ai exploit $TARGET"Aliases
Section titled “Aliases”Create shortcuts for common AI commands:
alias aiscan='ai scan'alias aiexploit='ai exploit'
# Usageaiscan 192.168.1.1aiexploit 192.168.1.1Scripting
Section titled “Scripting”Put AI commands in scripts:
#!/bin/bashecho "Starting automated hack..."
ai scan 192.168.1.1ai exploit 192.168.1.1"ai escalate to root"ai extract all data"
echo "Hack complete!"Tips for Success
Section titled “Tips for Success”1. Start Simple
Section titled “1. Start Simple”Begin with basic commands:
- View files
- List directories
- Simple searches
Then progress to:
- Scanning
- Exploitation
- Data extraction
2. Use Dry Run
Section titled “2. Use Dry Run”Before destructive operations:
ai dry run on"ai delete important_file.txt"# Check if this is what you wantai dry run off"3. Enable Verbose Mode
Section titled “3. Enable Verbose Mode”When learning:
ai verbose mode on"This shows you:
- What the AI is doing
- Which commands are executed
- Detailed progress
4. Be Specific
Section titled “4. Be Specific”Vague:
ai "scan" # Scan what?Specific:
ai scan 192.168.1.15. Save Your Work
Section titled “5. Save Your Work”After successful commands:
ai create a file called commands.txt# Note: Manually save your command history6. Read Output Carefully
Section titled “6. Read Output Carefully”The AI provides helpful information:
- Confirmation messages
- Error details
- Next step suggestions
7. Experiment Safely
Section titled “7. Experiment Safely”Use non-critical files for testing:
ai create an empty file called test.txtai change permissions of test.txt to 777ai delete test.txtCommon Mistakes
Section titled “Common Mistakes”Mistake 1: Not Using Quotes for Complex Commands
Section titled “Mistake 1: Not Using Quotes for Complex Commands”Most commands work fine without quotes:
ai show me test.txt # Works!ai scan 192.168.1.1 # Works!But use quotes for complex write operations to be safe:
ai "copy file with spaces.txt to backup folder/file.txt"ai delete important file.txtMistake 2: Wrong File Case
Section titled “Mistake 2: Wrong File Case”Wrong:
ai show me MYFILE.TXT# But file is actually MyFile.txtRight:
ai show me MyFile.txtMistake 3: Missing Target
Section titled “Mistake 3: Missing Target”Wrong:
ai "scan"# Error: No target specifiedRight:
ai scan 192.168.1.1Mistake 4: Confusing Commands
Section titled “Mistake 4: Confusing Commands”Wrong:
ai remove permissions"# Unclear: Delete file or remove permissions?Right:
ai remove all permissions from test.txt" # chmodai delete the file test.txt" # rmMistake 5: Not Checking Before Deleting
Section titled “Mistake 5: Not Checking Before Deleting”Wrong:
ai delete *.txt"# Deletes ALL .txt files!Right:
ai dry run on"ai delete *.txt"# Check what would be deletedai dry run off"# Then delete if okayGetting Help
Section titled “Getting Help”Ask the AI
Section titled “Ask the AI”ai helpai what commands are available?"ai how do I use scan?"ai explain chmodCheck Configuration
Section titled “Check Configuration”ai show config"ai display current settings"Enable Debug Mode
Section titled “Enable Debug Mode”ai debug mode on"# Run your problematic commandai show me test.txt"# Look at debug output for cluesRead Error Messages
Section titled “Read Error Messages”The AI provides helpful error messages:
Agent: No target specified for scanThis tells you: You need to specify what to scan!
Agent: File not found: test.txtThis tells you: The file doesn’t exist or wrong case!
Keyboard Shortcuts
Section titled “Keyboard Shortcuts”Command History
Section titled “Command History”Use arrow keys to recall previous commands:
- ↑ (Up Arrow): Previous command
- ↓ (Down Arrow): Next command
Tab Completion
Section titled “Tab Completion”Some shells support tab completion:
ai show me tes<TAB>"# Completes to: ai show me test.txt"Cancel Command
Section titled “Cancel Command”Press Ctrl+C to cancel a running command.
Best Practices
Section titled “Best Practices”1. Security
Section titled “1. Security”- Use stealth mode when hacking
- Clean up logs after exploitation
- Don’t leave obvious traces
2. Organization
Section titled “2. Organization”- Create folders for different projects
- Use descriptive filenames
- Back up important data
3. Efficiency
Section titled “3. Efficiency”- Learn common patterns
- Use dry run for complex commands
- Enable verbose when debugging
4. Safety
Section titled “4. Safety”- Test on non-critical files first
- Always backup before destructive operations
- Understand what a command does before running it
Conclusion
Section titled “Conclusion”You now know everything you need to use X’s AI Agent effectively!
Remember:
- Use natural language
- Be specific with targets
- Check output carefully
- Use dry run for destructive operations
- Enable verbose when learning
Start with simple commands and gradually work up to complex operations.
Quick Start Checklist
Section titled “Quick Start Checklist”- Try viewing a file:
ai show me test.txt" - Try copying a file:
ai copy test.txt to backup.txt - Try scanning:
ai scan local" - Configure settings:
ai verbose mode on" - Read this handbook again when stuck
Good luck hacking! 🚀
Document Version: 1.0
AI System Version: 0.9.7.2
Last Updated: 2024
For technical details, see the AI Developer Handbook.