We simulate a scenario where an attacker has gained access to the internal network — for example through a compromised workstation, VPN account or physical network connection. As a first step we map the network architecture: identifying open ports and services, performing OS and version fingerprinting, mapping network segmentation and testing default credentials on network devices and management interfaces.
We focus on vulnerabilities and configuration weaknesses — combinations of technical CVEs and configuration errors that enable further compromise. We test weak authentication, missing MFA and lockout policies, unauthorised access to management interfaces and excessive service account permissions. We also assess the security of network devices: firewalls, switches, routers, VPN gateways, SNMPv1 community strings and ACL misconfigurations.
A core focus is Active Directory — Kerberoasting, AS-REP Roasting, misconfigured GPOs, paths to Domain Admin through excessive permissions and misconfigured domain trusts. We verify the real-world impact of compromise: privilege escalation, lateral movement, data exfiltration simulation and ransomware scenarios. The output is a precise attack path description from a standard user all the way to full domain compromise.