Active Directory Penetration Testing & Hardening
AD is the prize. Every ransomware operator, every nation-state team, every red teamer goes for it because owning AD owns the environment. We test the path attackers actually take — and hand you the hardening roadmap to close it.
The AD attack surface
Active Directory wasn't designed for the modern threat model — it was designed for trust. Two decades of accumulated ACLs, nested group memberships, service accounts with SPNs and weak passwords, and ADCS templates with subtle permission grants all add up to attack paths nobody documented. The assessment makes those paths visible.
What we test: Kerberoasting against service accounts with SPNs (T1558.003), AS-REP roasting against accounts with pre-auth disabled (T1558.004), ACL abuse via WriteOwner / WriteDACL / GenericAll on tier-zero objects, GPO weaponization where a low-privilege user can modify a policy applied to higher-tier systems, ADCS exploitation across the documented ESC1-ESC16 patterns, unconstrained / constrained / RBCD delegation abuse, BloodHound path analysis to identify every route from low-privilege user to Domain Admin, and DCSync / DCShadow capability validation for accounts that have replication rights.
Assessment scope
- Low-privilege domain user starting point (matches realistic attacker scenario)
- BloodHound / SharpHound collection and path analysis to Domain Admin and other tier-zero assets
- Kerberoasting + AS-REP roasting with offline cracking against your domain hash standards
- ACL audit across users, groups, computers, GPOs, and AD-integrated DNS zones
- ADCS enumeration and exploitation — certificate template misconfiguration, enrollment agent abuse
- Kerberos delegation abuse (unconstrained, constrained, resource-based constrained)
- GPO weaponization — startup scripts, scheduled tasks, MSI installs
- Domain trust enumeration and cross-trust attack paths
- Tier-zero asset identification and current isolation posture
Deliverables & hardening roadmap
The headline deliverable is a path-to-Domain-Admin write-up: the actual narrative of how a starting low-privilege user became Domain Admin in your environment, with screenshots and command logs at each step. Even if there is more than one path (there usually is), we document the cleanest two or three so your team can prioritize remediation.
Paired with the attack narrative is a prioritized hardening roadmap: specific registry keys to change, GPOs to deploy, ACLs to revoke, ADCS templates to remove or restrict, service account password policies, tier-zero isolation patterns (the Microsoft tier model adapted to your environment), and Kerberos hardening (AES-only, no RC4, FAST). Every recommendation maps to the finding that motivated it, and every finding maps to a MITRE ATT&CK technique ID so your SOC / EDR team can write detections in parallel.
MITRE ATT&CK alignment
AD pentests touch the tactics that matter most to defenders: initial access (T1078 valid accounts, T1133 external remote services), credential access (T1558 Kerberos abuse, T1003 OS credential dumping), privilege escalation (T1548, T1134), defense evasion (T1550 alternate auth), persistence (T1098 account manipulation, T1078 valid accounts), and lateral movement (T1021 remote services). The report is structured around the ATT&CK tactic chain so your detection team can validate each tactic in their SIEM. For broader ATT&CK validation, see MITRE ATT&CK assessments.
Reference engagement
See our Active Directory pentest case study for the full path-to-DA narrative — Kerberoasting, ADCS ESC1 abuse, lateral movement via SMB, and the hardening roadmap that closed the chain. This is the depth of reporting and analysis you should expect on every engagement.
AD assessments served from Macon, GA, with clients across Atlanta, Savannah, and nationwide. For the broader pentest program, see our penetration testing services.
FAQs
What's the typical attack chain you find in AD environments?
Low-privilege user → Kerberoasting a service account → cracking offline → using that account's ACL or group membership to reach a tier-zero asset → ADCS template abuse or DCSync. Most domains we test have at least one BloodHound path to Domain Admin shorter than five hops. The path varies; the existence of a path almost never does.
Will you damage our AD or lock out accounts?
No. We use lockout-aware password spraying that respects your domain policy, never modify AD objects without explicit authorization, and coordinate any high-impact action with your team. Account compromise simulation uses test accounts you provision, not real user accounts.
Do you provide hardening recommendations or just findings?
Both. Every finding includes specific remediation steps — registry keys, group policy changes, ACL adjustments, ADCS template fixes, and tier-zero isolation patterns. The report is structured to drive an actual hardening sprint, not just hand a list to your auditor.
How does this map to MITRE ATT&CK?
AD pentests touch initial access (T1078 valid accounts, T1133 external remote services), credential access (T1558 Kerberos, T1003 OS credential dumping), privilege escalation (T1548, T1134), defense evasion (T1550 alternate auth), and lateral movement (T1021 remote services, T1550). The report includes a per-finding ATT&CK technique ID for your detection team.
Do we need a Domain Admin account to give you?
No. We work from a standard low-privilege domain user account by default — that is the realistic starting point for an internal attacker. Higher-privilege test accounts only come into play if you specifically want a tier-zero or DC audit.
Pentest reading by topic
All postsBest Penetration Testing Companies in Georgia (2026)
Georgia-based pentest providers, what they actually deliver, and how to choose.
Read postCybersecurity Services for SaaS Startups (2026)
What security work a SaaS founder actually needs in years 1-3.
Read postPenetration Test Cost (2026)
Real pricing for web app, network, AD, and red team engagements.
Read post
Related services
Close the path to Domain Admin.
Call William Beltz at (770) 652-1282 or book a scoping call to walk through your AD environment and hardening priorities.