InternalNetworkPenetrationTesting
Perimeters fail. Phishing, VPN compromise, rogue devices. The question is what happens to your business the day they do. Our CREST-certified testers operate from inside your network as an attacker would: mapping Active Directory attack paths, testing VLAN segmentation, and tracing the exact route from a standard user foothold to domain-level access. Used by UK organisations for PCI DSS Requirement 11.3, ISO 27001, and annual cyber insurance renewal.
Internal Network Penetration Testing:
Beyond the Scanner
We act like an attacker who already has a foothold. Using BloodHound to map Active Directory attack paths, chaining credentials via LLMNR poisoning and Pass-the-Hash, and testing VLAN segmentation boundaries. Our testing follows the same kill chain a ransomware group would execute, with one difference: we document every step and show you how to close each path.
Lateral Movement
We test how far an attacker can go from a single compromised workstation. We attempt SMB/RPC pivoting, Pass-the-Hash, Pass-the-Ticket, and token impersonation to move across your network and reach systems a standard user account should never touch.
Active Directory Security
AD is the path to domain dominance. We run tools like BloodHound to map attack paths, enumerate ACL misconfigurations, test for Kerberoasting, AS-REP roasting, GPO abuse, NTLM relay, and unconstrained delegation. We then chain findings to demonstrate the shortest route from standard user to Domain Admin. See our dedicated Active Directory security assessment.
Privilege Escalation
From standard user to Domain Admin. We chain local escalation techniques including token impersonation, unquoted service paths, credential dumping, and misconfigured local admin groups to map every escalation route from initial foothold to full domain compromise.
Segmentation Verification
We verify if your VLANs and firewalls actually stop lateral movement, or if legacy rules allow attackers to bypass segmentation controls. We test inter-VLAN routing, firewall rule effectiveness, and trust boundaries between network segments. Learn more about our network segmentation testing.
Credential Harvesting & Host Attacks
We exploit broadcast protocols (LLMNR, NBT-NS, mDNS) to harvest credentials, attack DPAPI credential stores, extract cached domain credentials from workstations, and target internal services running default or weak configurations.
Confidential Reporting
Internal findings often expose sensitive architecture and employee data. Our encrypted portal ensures this data never leaves a secure channel. Every engagement includes a technical remediation guide with CVSS scores and an executive summary for the board.
Internal Network Risk Profile
Internal networks remain the highest-impact attack surface for ransomware. 30% of all breaches originate from compromised internal credentials or insider threats.
Avg UK Breach Cost
Average cost of a UK data breach, frequently caused by lateral movement from a single compromised endpoint.
Insider Threats
Of all data breaches are initiated by insiders or compromised internal credentials, making internal attack surface validation critical.
Compliance Frameworks
Internal testing satisfies PCI DSS 11.3, ISO 27001, Cyber Essentials Plus, and cyber insurance renewal requirements.
Controls
What We Find in UK Corporate Networks
Anonymised examples from recent internal network penetration testing engagements. These are the high-risk configurations that expose current UK organisations to ransomware.
Kerberoasting
Abusing valid Kerberos ticket requests to crack service account passwords offline, often leading to admin access.
LLMNR/NBT-NS Poisoning
A legacy protocol flaw that allows attackers to steal password hashes from the network just by listening to broadcast traffic.
AD CS Misconfiguration (ESC1)
Vulnerable Certificate Templates allow attackers to request authentication certificates on behalf of Domain Admins, granting stealthy persistence.
Unpatched Internal Services
Internal servers often lag behind on patches. Exploits like PrintNightmare or BlueKeep offer instant system access without credentials.
NTLM Relay / SMB Signing Disabled
Without SMB signing enforced, attackers can relay NTLM authentication to access systems and escalate privileges, making it one of the most consistently exploited findings in real internal engagements.
VLAN Segmentation Bypass
Legacy firewall rules and misconfigured trunk ports create unintended trust relationships between network segments that are supposed to be fully isolated.
Internal Audit Checklist
A structured approach to validating internal defences, from initial access to domain compromise and board-ready reporting.
Access & Reconnaissance
We establish a secure bridge into your network via a pre-configured VM or VPN, then map the internal attack surface: active hosts, AD domains, and internal portals often left unpatched or using default credentials.
Vulnerability Identification
We identify specific internal risks: missing SMB signing, weak ACLs, default credentials on printers and IoT devices, and broadcast name poisoning (LLMNR/NBT-NS).
Exploitation & Pivoting
We exploit findings to move laterally, elevating privileges from a standard user to Domain Admin and accessing restricted subnets, documenting every step of the attack chain.
Board-Ready Reporting
You receive a technical remediation guide with CVSS scores, affected systems, and step-by-step fixes, plus an executive summary for the board with business risk context and a prioritised action plan. Retest is included.
What You Get
Every internal network penetration test includes the following deliverables, formatted for both technical teams and the board.
Reports are delivered via our real-time penetration testing portal with role-based access. Also available in PDF and DOCX formats.
You Need Internal Testing If...
Internal network penetration testing is typically triggered by one of these six scenarios. If any of these apply, you are in the right place.
PCI DSS Compliance
Your PCI DSS QSA has asked for evidence of Requirement 11.3 compliance.
Cyber Insurance Renewal
Your cyber insurance renewal questionnaire asks about internal testing separately from external.
ISO 27001 Audit
Your ISO 27001 audit requires evidence of technical security control testing.
Post-Perimeter Testing
You have never tested what an attacker could do after successfully bypassing your perimeter.
Active Directory Scale
You operate Active Directory with more than 100 users.
Post-Phishing Assessment
You experienced a phishing attack and are not certain whether internal access was gained.
Internal Network Penetration Testing Pricing
Fixed-price engagements with no day-rate overruns. All tiers include a CREST-certified tester, retest, and board-ready report.
Close the Loop.
After the Test.
Your internal penetration test identifies what is exploitable today. We feed those exact findings into our 24/7 Managed SOC and EdgeProtect attack surface management, building custom detection rules for lateral movement and privilege escalation paths discovered during your test.
Explore Defensive ServicesEdgeProtect ASM
Continuous attack surface monitoring of your internal and external network perimeter.
24/7 SOC Monitoring
Custom detection rules tuned to the lateral movement paths found in your test.
External Network Testing
Pair with external infrastructure testing for complete perimeter and internal coverage.
Red Team Operations
Full adversarial simulation combining social engineering, phishing, and internal exploitation.
Full Penetration Testing Catalogue
Comprehensive penetration testing services tailored to your environment.
Internal Testing
Post-perimeter assessments targeting Active Directory, lateral movement, privilege escalation, and segmentation validation from inside your network.
The best time to test your defences is now.
Join the high-growth companies relying on Precursor for continuous offensive and defensive security.
Frequently Asked Questions
Common questions about this service, methodologies, and deliverables.
Internal network penetration testing typically costs between £5,000 and £15,000 depending on network size, domain complexity, and testing scope. A standard internal test for a mid-sized organisation (200-500 users, single domain) averages £7,500 for 6 days of testing. Larger organisations with multiple domains, complex Active Directory forests, or extensive network segmentation typically cost £10,000-£15,000. We provide fixed-price quotes after reviewing your network architecture and user count. All engagements are fixed-price: the quote provided after scoping is the amount you pay, with no day-rate overruns or scope creep surcharges. See our full breakdown on our penetration testing cost page.
An internal network penetration test is a security assessment that simulates an attack from inside your network, mimicking a malicious employee or a threat actor who has already breached your perimeter. Unlike external testing (which attacks from the internet), internal testing focuses on what an attacker can do after gaining access, such as moving laterally, escalating privileges in Active Directory, or deploying ransomware across your network.
External penetration testing attacks your organisation from the internet, targeting public-facing systems: your website, VPN gateway, email servers, and external IP addresses. It simulates a threat actor who has no prior access to your environment, testing the lock on the front door. Internal penetration testing begins from inside your corporate network, simulating either a malicious insider (an employee or contractor) or a threat actor who has already gained initial access via phishing, a compromised VPN credential, or a physical device. It tests whether an attacker already inside the building can move freely, reaching sensitive file shares, escalating privileges in Active Directory, or deploying ransomware across your network. Most compliance frameworks require both. PCI DSS Requirement 11.3 mandates annual internal and external testing as separate engagements. ISO 27001 Annex A.8.8 and cyber insurance questionnaires increasingly ask for evidence of both types. If you have only conducted an external network penetration test to date, your internal attack surface has never been validated.
Firewalls only protect the perimeter. Once an attacker bypasses the firewall (via phishing, VPN compromise, or weak Wi-Fi), there are often few controls stopping them from reaching sensitive data. Perimeters are eventually breached; internal penetration testing ensures that a single breach does not result in a total ransomware takeover by validating network segmentation and access controls.
Yes, Active Directory (AD) security is a primary focus of internal testing. We identify misconfigurations like weak ACLs, Kerberoasting opportunities, and unpatched Domain Controllers that would allow an attacker to escalate from a standard user to a Domain Admin, giving them total control over your IT infrastructure.
Yes. PCI DSS Requirement 11.3 mandates both internal and external penetration testing at least annually and after any significant infrastructure change. Failure to evidence this during a QSA audit can result in loss of PCI compliance status and suspension of card processing. Our reports are fully compliant with PCI DSS standards, providing the evidence auditors need to validate your segmentation and internal security controls.
Our methodology mirrors the exact path ransomware groups (like LockBit or BlackCat) take: Initial Access, Internal Recon, Lateral Movement, Domain Compromise. By identifying and closing these paths, you effectively neutralise the impact of a ransomware outbreak before it happens, preventing data exfiltration and encryption.
We typically perform internal testing remotely using a pre-configured hardware testing device or a virtual machine (VM) that you deploy inside your network. This device establishes a secure, encrypted tunnel back to our command centre, allowing our CREST-certified testers to operate as if they were physically sitting in your office.
The terms are often used interchangeably by UK organisations and refer to the same assessment scope. 'Infrastructure penetration testing' typically describes the broader category that includes both internal network testing (testing the corporate LAN, Active Directory, and internal servers) and external network testing (testing public-facing infrastructure). When most UK organisations request 'infrastructure penetration testing,' they mean an internal network assessment: testing the servers, endpoints, Active Directory environment, and network segmentation controls that make up their internal IT infrastructure. At Precursor Security, our internal network penetration tests cover the full internal infrastructure scope: Active Directory, segmentation, lateral movement paths, and server-level vulnerabilities.
Yes, increasingly. Major UK cyber insurance underwriters (including those operating through Lloyd's of London syndicates) have tightened technical requirements since 2022. Annual internal penetration testing is now a standard requirement for cyber policies above £1M coverage, and failure to evidence it can result in claim rejection following a breach. The exact requirements vary by policy, but common stipulations include: annual internal testing by a CREST-accredited provider, evidence of Active Directory and network segmentation testing, and a findings remediation report. We issue test completion certificates alongside our reports that satisfy insurance renewal questionnaire requirements.
Yes. Active Directory security is a primary focus of every internal network penetration test we conduct. Our testing covers Kerberoasting and AS-REP roasting (cracking service account passwords offline), Pass-the-Hash and Pass-the-Ticket attacks, NTLM relay attacks against hosts with SMB signing disabled, GPO misconfiguration and ACL abuse, and unconstrained delegation exploitation. We use BloodHound to map the complete attack path from standard user to Domain Admin and document every exploitable path with a specific finding, CVSS score, and remediation step.
Lateral movement is the phase of an attack where a threat actor, having gained initial access to one system, moves across the internal network to reach higher-value targets: domain controllers, finance servers, backup systems, or crown jewel data stores. It is how a phishing email that compromises a single employee's laptop turns into a full domain ransomware event. In our internal tests, we simulate lateral movement by chaining credentials stolen via LLMNR/NBT-NS poisoning, tokens captured via impersonation, and Pass-the-Hash techniques, then using those credentials to access systems the original compromised account should never reach. Testing lateral movement paths is the core purpose of an internal penetration test. Firewalls and EDR tools are designed to stop lateral movement, but only if they are configured correctly. We test whether they actually do.
Yes. Segmentation verification is one of the four primary test areas in every internal engagement. We attempt to move between VLANs, test whether firewall rules enforce the intended segmentation boundaries, and verify that legacy access rules do not create unintended trust relationships between segments. PCI DSS Requirement 11.3.4 specifically mandates penetration testing of segmentation controls for organisations that use network segmentation to reduce their cardholder data environment scope. Organisations that rely on VLAN segmentation to isolate their OT/ICS environment, production systems, or financial data are often surprised to find that legacy firewall rules (created years ago for a specific project and never removed) allow direct access between segments that are supposed to be isolated.



