Pentest Network Internal
Purpose
Simulate an internal attacker to identify weak credentials, misconfigured services, and Active Directory paths to high-value assets.
Core Workflow
- Network Discovery: Map the internal network, live hosts, and open ports using
nmapandmasscan. - Service Enumeration: Identify running services, versions, and potential entry points (SMB, RDP, SSH, etc.).
- Vulnerability Scanning: Check for known service vulnerabilities (e.g., EternalBlue, ZeroLogon) using
nucleiandnmap-scripts. - Credential Auditing: Test weak passwords and default credentials using
hydraandnetexec(CrackMapExec). - Active Directory Enum: Map AD trust relationships, users, and groups using
bloodhoundandldapdomaindump. - Lateral Movement: Simulate movement between hosts using valid credentials or exploits.
References
references/tools.mdreferences/workflows.md