Skip to main content
Home / Services / Active Directory & Domain Penetration Testing

Active Directory & Domain Penetration Testing

Assess your Windows domain infrastructure security

2-3 weeks Starting at $10,000
AD Attack Path DOMAIN ADMIN REACHED
Unprivileged User[email protected]
AS-REP Roasting
Service Account[email protected]
Kerberoasting
SQL Server AdminDCSync via replication rights
DCSync Attack
Domain AdminFull domain compromise
Overview

What This Engagement Covers

A comprehensive assessment tailored to your environment.

Active Directory is the backbone of most enterprise networks and a prime target for attackers. Our AD penetration testing simulates real-world attacks to identify paths to domain compromise, privilege escalation opportunities, and lateral movement vectors.

Our Process

What We Test & How

What We Test

We assess your entire Active Directory infrastructure including domain controllers, trust relationships, group policies, privileged accounts, authentication protocols (Kerberos, NTLM), delegation configurations, and Azure AD/Entra ID integration. Our testing identifies misconfigurations that could lead to full domain compromise.

Our Approach

Starting from an unprivileged user account or network foothold, we attempt to escalate privileges and gain domain admin access using real attacker TTPs. We map privilege escalation paths, identify kerberoasting opportunities, test for delegation abuse, and analyze GPO misconfigurations using tools like BloodHound.

Deliverables

What You'll Receive

Everything included in your engagement report.

Complete attack path visualization with BloodHound

Privilege escalation vulnerability report

Kerberos security assessment

Trust relationship security analysis

Privileged account inventory and risk assessment

GPO security configuration review

Azure AD/Entra ID security findings

Hardening recommendations and remediation roadmap

Methodology

Our Testing Methodology

A structured approach to identifying and validating vulnerabilities.

1

Initial network reconnaissance and LDAP enumeration

2

Privilege escalation through misconfigurations

3

Kerberoasting and AS-REP roasting attacks

4

Pass-the-hash and pass-the-ticket techniques

5

Delegation abuse and constrained delegation

6

BloodHound analysis for attack paths

7

GPO abuse and privilege escalation

8

Azure AD/Entra ID integration security

Findings

Common Vulnerabilities We Find

Typical security issues discovered during this type of engagement.

Kerberoastable Service Accounts Unconstrained Delegation Weak Password Policies Excessive Domain Admin Rights AS-REP Roasting Vulnerabilities GPO Privilege Escalation Legacy Protocol Support (NTLM) Weak Trust Configurations
Who It's For

Ideal For

Enterprise Organizations
Financial Institutions
Healthcare Systems
Government Agencies
Large Corporate Networks
Managed Service Providers
Compliance

Standards We Support

NIST 800-53 CIS Benchmarks PCI-DSS HIPAA ISO 27001

Ready to Get Started?

$10,000

Typical engagement: 2-3 weeks

Why Us

Why Lorikeet Security

Certified Experts

OSCP, OSCE, CEH, GPEN certified professionals

Auditor Ready

Reports designed for compliance audits

Free Retesting

Validate fixes at no additional cost

Expert Support

Direct access to testing team during remediation

Lory waving

Hi, I'm Lory! Need help finding the right service? Click to chat!