pentest-network-internal
Pentest Network Internal
Purpose
Simulate an internal attacker to identify weak credentials, misconfigured services, and Active Directory paths to high-value assets.
Core Workflow
- Network Discovery: Map the internal network, live hosts, and open ports using
nmapandmasscan. - Service Enumeration: Identify running services, versions, and potential entry points (SMB, RDP, SSH, etc.).
- Vulnerability Scanning: Check for known service vulnerabilities (e.g., EternalBlue, ZeroLogon) using
nucleiandnmap-scripts. - Credential Auditing: Test weak passwords and default credentials using
hydraandnetexec(CrackMapExec). - Active Directory Enum: Map AD trust relationships, users, and groups using
bloodhoundandldapdomaindump. - Lateral Movement: Simulate movement between hosts using valid credentials or exploits.
References
references/tools.mdreferences/workflows.md
More from jd-opensource/joysafeter
pentest-osint-recon
Open Source Intelligence gathering and attack surface management for external reconnaissance.
89pentest-mobile-app
OWASP Mobile Top 10 security testing for Android and iOS — local storage, certificate pinning bypass, IPC abuse, and binary protections.
59pentest-api-deep
Deep OWASP API Security Top 10 testing for REST, GraphQL, gRPC, and WebSocket APIs — BFLA, mass assignment, rate limiting, and unsafe consumption.
58pentest-exploit-validation
Proof-driven exploitation with 4-level evidence system, bypass exhaustion protocol, mandatory evidence checklists, and strict EXPLOITED/POTENTIAL/FALSE_POSITIVE classification.
54pentest-ai-llm-security
AI/LLM application security testing — prompt injection, jailbreaking, data exfiltration, and insecure output handling per OWASP LLM Top 10.
54pentest-secrets-exposure
Discover hardcoded credentials, leaked API keys, exposed configuration files, sensitive data in artifacts, and information disclosure via error handling.
52