How far can an attacker go
once they are inside your network?
A simulated insider or post-breach attack across your internal network. Every path from initial foothold to domain compromise, mapped and documented.
What is an internal pentest?
You know your perimeter is guarded. You have internal systems you assume are safe. You get a realistic picture of what happens when an attacker, a compromised workstation, or a malicious insider gains a foothold. An internal pentest simulates an attacker who is already on your network, exploring Active Directory, lateral movement paths, privilege escalation, and access to sensitive data. You receive a detailed report with attack paths and concrete hardening recommendations.
Internal Pentest: what happens after the perimeter falls
Not every threat comes from outside. A malicious insider, a compromised workstation, or a visitor with network access: the internal network is often the real battlefield. An internal pentest simulates an attacker who has already gained a foothold and investigates how far they can go.
The team tests from a position within your network. This can be a connected laptop on an arbitrary network point, a VPN connection, or a compromised workstation. From there, all internal attack paths are explored: network segmentation, Active Directory configuration, internal applications, and shared resources.
Many organisations invest heavily in perimeter security but underestimate internal risks. An internal pentest reveals whether an attacker with limited initial access can escalate to domain admin, reach sensitive data, or access critical systems. It tests not just individual vulnerabilities but full attack paths.
Three internal risks most organisations underestimate
-
A single compromised account can reach everything
Weak segmentation and overprivileged accounts mean that one phished user or infected endpoint can become a gateway to your entire Active Directory environment.
-
Legacy systems and misconfigurations persist for years
Old protocols like NTLM, unpatched servers, and default credentials accumulate silently. Attackers know exactly where to look and exploit them before your team finds them.
-
Lateral movement goes undetected for months
Without proper internal monitoring, attackers move through the network undetected. The average dwell time before detection is measured in months, not hours.
Scope of the internal pentest
How DEFION conducts an internal pentest
Kick-off and scoping
Defining the starting point (which network segment, which initial rights), constraints, and objectives.
Network reconnaissance
Mapping the internal network, identifying active hosts, services, and infrastructure components.
Vulnerability identification
Searching for misconfigurations, outdated software, weak credentials, and insecure protocols.
Exploitation and privilege escalation
Exploiting found vulnerabilities, escalating rights, lateral movement through the network.
Domain compromise assessment
Evaluating whether full domain compromise is possible, including the path to domain admin.
Reporting and debrief
Detailed report with attack paths, CVSS scores, and prioritised remediation. Technical walkthrough with your team.
Deliverables
- Executive summary
- Technical report with attack paths, exploitation evidence, and CVSS scores
- Active Directory security assessment
- Network architecture observations and segmentation advice
- Remediation steps per finding with prioritisation
- Report debrief with technical team
Who is an internal pentest for?
An internal pentest is relevant for any organisation where internal access could lead to significant damage. If an employee, contractor, or compromised device can cause serious harm, you need to know how.
- Organisations that want to validate their internal network segmentation
- Companies with complex Active Directory environments
- IT teams that want to understand the risk of a compromised workstation
- Organisations preparing NIS2 or ISO 27001 compliance
- Companies after a merger where networks have been combined
FAQ
From which starting point is the test performed?
Is Active Directory specifically tested?
Can this disrupt daily operations?
How does an internal pentest differ from a vulnerability assessment?
Can I combine an internal pentest with an external pentest?
Ready to test your internal attack surface?
Tell us your starting point and objectives. We scope the right approach and start within days.
®