The Challenge
The client had a compliance audit coming up and wanted more than a vulnerability scan. They wanted to know what a real attacker would actually do inside their network — not a list of unpatched CVEs, but a walkthrough of how a compromised workstation becomes Domain Admin. Their internal security team was thin, and previous assessments had been shallow.
Our Approach
We ran the engagement end-to-end with our own red team toolkit — eleven attack modules covering reconnaissance, credential spraying, Kerberoasting, ADCS certificate abuse, lateral movement, and C2 infrastructure. Every finding was mapped to a MITRE ATT&CK technique. We documented the full attack chain from initial foothold through privilege escalation, with screenshots, timestamps, and the specific misconfigurations that made each step possible. The final deliverable was two documents: a technical report for their security team, and an executive summary with a prioritized remediation roadmap for leadership.
Tech Stack
The Outcome
Full attack chain from a standard user credential to Domain Admin demonstrated and documented. Remediation roadmap prioritized by exploitability rather than CVSS score, so the security team knew what to fix first. The compliance audit passed on the first attempt. The client has since engaged us for follow-up testing on a six-month cadence.
Like to know more about this project? Talk to William.