pentest-network-internal

Internal network penetration testing, Active Directory enumeration, and lateral movement simulation.

Safety Notice

This listing is imported from skills.sh public index metadata. Review upstream SKILL.md and repository scripts before running.

Copy this and send it to your AI assistant to learn

Install skill "pentest-network-internal" with this command: npx skills add jd-opensource/joysafeter/jd-opensource-joysafeter-pentest-network-internal

Pentest Network Internal

Purpose

Simulate an internal attacker to identify weak credentials, misconfigured services, and Active Directory paths to high-value assets.

Core Workflow

  1. Network Discovery: Map the internal network, live hosts, and open ports using nmap and masscan.
  2. Service Enumeration: Identify running services, versions, and potential entry points (SMB, RDP, SSH, etc.).
  3. Vulnerability Scanning: Check for known service vulnerabilities (e.g., EternalBlue, ZeroLogon) using nuclei and nmap-scripts.
  4. Credential Auditing: Test weak passwords and default credentials using hydra and netexec (CrackMapExec).
  5. Active Directory Enum: Map AD trust relationships, users, and groups using bloodhound and ldapdomaindump.
  6. Lateral Movement: Simulate movement between hosts using valid credentials or exploits.

References

  • references/tools.md
  • references/workflows.md

Source Transparency

This detail page is rendered from real SKILL.md content. Trust labels are metadata-based hints, not a safety guarantee.

Related Skills

Related by shared tags or category signals.

General

pentest-mobile-app

No summary provided by upstream source.

Repository SourceNeeds Review
General

pentest-osint-recon

No summary provided by upstream source.

Repository SourceNeeds Review
General

pentest-exploit-validation

No summary provided by upstream source.

Repository SourceNeeds Review