External perimeter
Every public IP, port, service, certificate, DNS record. Discover what is exposed, what is misconfigured, what would let an attacker in.
External perimeter testing (every IP, port, service, cert) and internal network testing (AD enumeration, kerberoasting, ADCS misconfigurations, lateral movement). We deliver attack paths with screenshots, not configuration findings.
External, internal, and Active Directory in scope by default. Cloud network in scope on request.
Every public IP, port, service, certificate, DNS record. Discover what is exposed, what is misconfigured, what would let an attacker in.
From an assumed-breach starting point (low-privilege user account), test how far an attacker reaches. Domain, segment, crown-jewel data.
Kerberoasting, ASREProasting, ADCS misconfigurations, AdminSDHolder, GPO trust, delegation chains, group nesting, Entra ID hybrid issues.
For PCI / HIPAA / SOC 2: verify the network boundary actually contains the scope you claimed. Test segmentation under realistic conditions.
SMBv1, LLMNR, NBT-NS, mDNS, IPv6 abuse. Plaintext credentials in transit. RDP and SSH hardening.
Bastion hosts, PAM solutions, RDS/Citrix farms, ITSM platforms. Often the fast path to admin access.
PTES + OSSTMM + custom AD attack chains. Assumed-breach is the default starting point for internal engagements.
Network pentest deliverables.
Per-service findings with severity, exploit chain, fix steps. Asset inventory delta against your CMDB.
From foothold to crown jewels. Visual paths with technique annotations. Useful for engineering planning and board reporting.
Specific GPO / ADCS / delegation changes, ranked by attack risk and ops impact.
Where the network actually segments and where it does not. Critical for compliance scope confirmation.
Common triggers for a network pentest.
Your security program runs an annual external + internal pentest. We deliver attack paths, not configuration findings.
You acquired or merged. Two networks now connect. The combined attack surface needs mapping.
Compliance scope depends on segmentation holding. We verify it under realistic conditions.
Your cyber-insurance broker requires recent external + internal testing for the renewal.
Common questions for this engagement type. See main pentest FAQ for shared questions.
Both. External pentest starts with no foothold. Internal pentest starts assumed-breach (low-privilege user account) — far more realistic for budget vs coverage.
Network pentest goes deeper on exploitation (kerberoasting, ADCS, lateral movement). Infra audit covers broader configuration review. Often run together.
Yes if AD is not in your environment (cloud-only orgs without hybrid). For most enterprises, AD is where lateral movement happens and skipping it leaves the most important coverage out.
60-minute scoping call covers external surface, internal access, and AD scope. Free.