Precursor Security
Simulate the Insider Threat

InternalNetworkPenetrationTesting

Perimeters fail. Phishing, VPN compromise, rogue devices. The question is what happens to your business the day they do. Our CREST-certified testers operate from inside your network as an attacker would: mapping Active Directory attack paths, testing VLAN segmentation, and tracing the exact route from a standard user foothold to domain-level access. Used by UK organisations for PCI DSS Requirement 11.3, ISO 27001, and annual cyber insurance renewal.

Fixed-price quote within 24 hours
No commitment required
CREST Certified Testers
Scroll
Methodology

Internal Network Penetration Testing:
Beyond the Scanner

We act like an attacker who already has a foothold. Using BloodHound to map Active Directory attack paths, chaining credentials via LLMNR poisoning and Pass-the-Hash, and testing VLAN segmentation boundaries. Our testing follows the same kill chain a ransomware group would execute, with one difference: we document every step and show you how to close each path.

Attack Path

Lateral Movement

We test how far an attacker can go from a single compromised workstation. We attempt SMB/RPC pivoting, Pass-the-Hash, Pass-the-Ticket, and token impersonation to move across your network and reach systems a standard user account should never touch.

Identity & Access

Active Directory Security

AD is the path to domain dominance. We run tools like BloodHound to map attack paths, enumerate ACL misconfigurations, test for Kerberoasting, AS-REP roasting, GPO abuse, NTLM relay, and unconstrained delegation. We then chain findings to demonstrate the shortest route from standard user to Domain Admin. See our dedicated Active Directory security assessment.

Privilege Escalation

Privilege Escalation

From standard user to Domain Admin. We chain local escalation techniques including token impersonation, unquoted service paths, credential dumping, and misconfigured local admin groups to map every escalation route from initial foothold to full domain compromise.

Segmentation

Segmentation Verification

We verify if your VLANs and firewalls actually stop lateral movement, or if legacy rules allow attackers to bypass segmentation controls. We test inter-VLAN routing, firewall rule effectiveness, and trust boundaries between network segments. Learn more about our network segmentation testing.

Host Exploitation

Credential Harvesting & Host Attacks

We exploit broadcast protocols (LLMNR, NBT-NS, mDNS) to harvest credentials, attack DPAPI credential stores, extract cached domain credentials from workstations, and target internal services running default or weak configurations.

Deliverables

Confidential Reporting

Internal findings often expose sensitive architecture and employee data. Our encrypted portal ensures this data never leaves a secure channel. Every engagement includes a technical remediation guide with CVSS scores and an executive summary for the board.

Executive Summary

Internal Network Risk Profile

Internal networks remain the highest-impact attack surface for ransomware. 30% of all breaches originate from compromised internal credentials or insider threats.

High Risk
£3.4M

Avg UK Breach Cost

Average cost of a UK data breach, frequently caused by lateral movement from a single compromised endpoint.

Insider Vector
30%

Insider Threats

Of all data breaches are initiated by insiders or compromised internal credentials, making internal attack surface validation critical.

Verified Scope
4+

Compliance Frameworks

Internal testing satisfies PCI DSS 11.3, ISO 27001, Cyber Essentials Plus, and cyber insurance renewal requirements.

Mapped
Controls
PCI DSSReq 11.3
ISO 27001A.8.8 / A.8.29
Cyber InsuranceAnnual Evidence
CE PlusTechnical Audit
Real Findings

What We Find in UK Corporate Networks

Anonymised examples from recent internal network penetration testing engagements. These are the high-risk configurations that expose current UK organisations to ransomware.

Critical
Active Directory

Kerberoasting

Abusing valid Kerberos ticket requests to crack service account passwords offline, often leading to admin access.

CVSS 8.8MITRE T1558.003
Business ImpactFull domain compromise via offline credential cracking of service accounts with weak passwords.
High
Network Protocol

LLMNR/NBT-NS Poisoning

A legacy protocol flaw that allows attackers to steal password hashes from the network just by listening to broadcast traffic.

CVSS 7.5MITRE T1557.001
Business ImpactCredential theft enabling lateral movement from a single point on the corporate LAN.
Critical
Certificate Services

AD CS Misconfiguration (ESC1)

Vulnerable Certificate Templates allow attackers to request authentication certificates on behalf of Domain Admins, granting stealthy persistence.

CVSS 9.8MITRE T1649
Business ImpactPersistent domain-level access that survives password resets and account lockouts.
Critical
Patch Management

Unpatched Internal Services

Internal servers often lag behind on patches. Exploits like PrintNightmare or BlueKeep offer instant system access without credentials.

CVSS 9.0+MITRE T1210
Business ImpactRemote code execution on internal servers, providing immediate SYSTEM-level access.
Critical
Authentication

NTLM Relay / SMB Signing Disabled

Without SMB signing enforced, attackers can relay NTLM authentication to access systems and escalate privileges, making it one of the most consistently exploited findings in real internal engagements.

CVSS 8.1MITRE T1557.001
Business ImpactLateral movement across the network by relaying captured credentials to unsecured hosts.
High
Segmentation

VLAN Segmentation Bypass

Legacy firewall rules and misconfigured trunk ports create unintended trust relationships between network segments that are supposed to be fully isolated.

CVSS 7.2MITRE T1599
Business ImpactAccess to restricted subnets (PCI CDE, OT/ICS, finance) from the general corporate LAN.
Engagement Pipeline

Internal Audit Checklist

A structured approach to validating internal defences, from initial access to domain compromise and board-ready reporting.

Step 01

Access & Reconnaissance

We establish a secure bridge into your network via a pre-configured VM or VPN, then map the internal attack surface: active hosts, AD domains, and internal portals often left unpatched or using default credentials.

OutputAttack Surface Map
Step 02

Vulnerability Identification

We identify specific internal risks: missing SMB signing, weak ACLs, default credentials on printers and IoT devices, and broadcast name poisoning (LLMNR/NBT-NS).

OutputVulnerability Register
Step 03

Exploitation & Pivoting

We exploit findings to move laterally, elevating privileges from a standard user to Domain Admin and accessing restricted subnets, documenting every step of the attack chain.

OutputAttack Chain Evidence
Step 04

Board-Ready Reporting

You receive a technical remediation guide with CVSS scores, affected systems, and step-by-step fixes, plus an executive summary for the board with business risk context and a prioritised action plan. Retest is included.

OutputTechnical + Executive Report
Deliverables

What You Get

Every internal network penetration test includes the following deliverables, formatted for both technical teams and the board.

Technical report with CVSS-scored findings and step-by-step remediation
Executive summary with business risk context for the board
Active Directory attack path diagrams.
Prioritised remediation roadmap by risk severity
Evidence pack: screenshots, PoC commands, affected hosts
Free retest within the test window to verify remediation
Test completion certificate for compliance and insurance

Reports are delivered via our real-time penetration testing portal with role-based access. Also available in PDF and DOCX formats.

Common Triggers

You Need Internal Testing If...

Internal network penetration testing is typically triggered by one of these six scenarios. If any of these apply, you are in the right place.

PCI DSS Compliance

Your PCI DSS QSA has asked for evidence of Requirement 11.3 compliance.

Cyber Insurance Renewal

Your cyber insurance renewal questionnaire asks about internal testing separately from external.

ISO 27001 Audit

Your ISO 27001 audit requires evidence of technical security control testing.

Post-Perimeter Testing

You have never tested what an attacker could do after successfully bypassing your perimeter.

Active Directory Scale

You operate Active Directory with more than 100 users.

Post-Phishing Assessment

You experienced a phishing attack and are not certain whether internal access was gained.

Transparent Pricing

Internal Network Penetration Testing Pricing

Fixed-price engagements with no day-rate overruns. All tiers include a CREST-certified tester, retest, and board-ready report.

Small Network
Up to 200 users, single domain
From £5,000
Mid-MarketMost Popular
200-500 users, single domain
From £7,500
Enterprise
500+ users, multiple domains
From £12,500
CREST-certified tester
Technical + executive report
Retest included
Fixed-price quote
Final quote issued after a free scoping call.Get a Quote
After Testing

Close the Loop.
After the Test.

Your internal penetration test identifies what is exploitable today. We feed those exact findings into our 24/7 Managed SOC and EdgeProtect attack surface management, building custom detection rules for lateral movement and privilege escalation paths discovered during your test.

Explore Defensive Services
Service Catalogue

Full Penetration Testing Catalogue

Comprehensive penetration testing services tailored to your environment.

Ready to Secure

The best time to test your defences is now.

Join the high-growth companies relying on Precursor for continuous offensive and defensive security.

CREST Triple Accredited|Fixed Price Quotes|Free Scoping Call|UK Based Team

Frequently Asked Questions

Common questions about this service, methodologies, and deliverables.

Internal network penetration testing typically costs between £5,000 and £15,000 depending on network size, domain complexity, and testing scope. A standard internal test for a mid-sized organisation (200-500 users, single domain) averages £7,500 for 6 days of testing. Larger organisations with multiple domains, complex Active Directory forests, or extensive network segmentation typically cost £10,000-£15,000. We provide fixed-price quotes after reviewing your network architecture and user count. All engagements are fixed-price: the quote provided after scoping is the amount you pay, with no day-rate overruns or scope creep surcharges. See our full breakdown on our penetration testing cost page.

An internal network penetration test is a security assessment that simulates an attack from inside your network, mimicking a malicious employee or a threat actor who has already breached your perimeter. Unlike external testing (which attacks from the internet), internal testing focuses on what an attacker can do after gaining access, such as moving laterally, escalating privileges in Active Directory, or deploying ransomware across your network.

External penetration testing attacks your organisation from the internet, targeting public-facing systems: your website, VPN gateway, email servers, and external IP addresses. It simulates a threat actor who has no prior access to your environment, testing the lock on the front door. Internal penetration testing begins from inside your corporate network, simulating either a malicious insider (an employee or contractor) or a threat actor who has already gained initial access via phishing, a compromised VPN credential, or a physical device. It tests whether an attacker already inside the building can move freely, reaching sensitive file shares, escalating privileges in Active Directory, or deploying ransomware across your network. Most compliance frameworks require both. PCI DSS Requirement 11.3 mandates annual internal and external testing as separate engagements. ISO 27001 Annex A.8.8 and cyber insurance questionnaires increasingly ask for evidence of both types. If you have only conducted an external network penetration test to date, your internal attack surface has never been validated.

Firewalls only protect the perimeter. Once an attacker bypasses the firewall (via phishing, VPN compromise, or weak Wi-Fi), there are often few controls stopping them from reaching sensitive data. Perimeters are eventually breached; internal penetration testing ensures that a single breach does not result in a total ransomware takeover by validating network segmentation and access controls.

Yes, Active Directory (AD) security is a primary focus of internal testing. We identify misconfigurations like weak ACLs, Kerberoasting opportunities, and unpatched Domain Controllers that would allow an attacker to escalate from a standard user to a Domain Admin, giving them total control over your IT infrastructure.

Yes. PCI DSS Requirement 11.3 mandates both internal and external penetration testing at least annually and after any significant infrastructure change. Failure to evidence this during a QSA audit can result in loss of PCI compliance status and suspension of card processing. Our reports are fully compliant with PCI DSS standards, providing the evidence auditors need to validate your segmentation and internal security controls.

Our methodology mirrors the exact path ransomware groups (like LockBit or BlackCat) take: Initial Access, Internal Recon, Lateral Movement, Domain Compromise. By identifying and closing these paths, you effectively neutralise the impact of a ransomware outbreak before it happens, preventing data exfiltration and encryption.

We typically perform internal testing remotely using a pre-configured hardware testing device or a virtual machine (VM) that you deploy inside your network. This device establishes a secure, encrypted tunnel back to our command centre, allowing our CREST-certified testers to operate as if they were physically sitting in your office.

The terms are often used interchangeably by UK organisations and refer to the same assessment scope. 'Infrastructure penetration testing' typically describes the broader category that includes both internal network testing (testing the corporate LAN, Active Directory, and internal servers) and external network testing (testing public-facing infrastructure). When most UK organisations request 'infrastructure penetration testing,' they mean an internal network assessment: testing the servers, endpoints, Active Directory environment, and network segmentation controls that make up their internal IT infrastructure. At Precursor Security, our internal network penetration tests cover the full internal infrastructure scope: Active Directory, segmentation, lateral movement paths, and server-level vulnerabilities.

Yes, increasingly. Major UK cyber insurance underwriters (including those operating through Lloyd's of London syndicates) have tightened technical requirements since 2022. Annual internal penetration testing is now a standard requirement for cyber policies above £1M coverage, and failure to evidence it can result in claim rejection following a breach. The exact requirements vary by policy, but common stipulations include: annual internal testing by a CREST-accredited provider, evidence of Active Directory and network segmentation testing, and a findings remediation report. We issue test completion certificates alongside our reports that satisfy insurance renewal questionnaire requirements.

Yes. Active Directory security is a primary focus of every internal network penetration test we conduct. Our testing covers Kerberoasting and AS-REP roasting (cracking service account passwords offline), Pass-the-Hash and Pass-the-Ticket attacks, NTLM relay attacks against hosts with SMB signing disabled, GPO misconfiguration and ACL abuse, and unconstrained delegation exploitation. We use BloodHound to map the complete attack path from standard user to Domain Admin and document every exploitable path with a specific finding, CVSS score, and remediation step.

Lateral movement is the phase of an attack where a threat actor, having gained initial access to one system, moves across the internal network to reach higher-value targets: domain controllers, finance servers, backup systems, or crown jewel data stores. It is how a phishing email that compromises a single employee's laptop turns into a full domain ransomware event. In our internal tests, we simulate lateral movement by chaining credentials stolen via LLMNR/NBT-NS poisoning, tokens captured via impersonation, and Pass-the-Hash techniques, then using those credentials to access systems the original compromised account should never reach. Testing lateral movement paths is the core purpose of an internal penetration test. Firewalls and EDR tools are designed to stop lateral movement, but only if they are configured correctly. We test whether they actually do.

Yes. Segmentation verification is one of the four primary test areas in every internal engagement. We attempt to move between VLANs, test whether firewall rules enforce the intended segmentation boundaries, and verify that legacy access rules do not create unintended trust relationships between segments. PCI DSS Requirement 11.3.4 specifically mandates penetration testing of segmentation controls for organisations that use network segmentation to reduce their cardholder data environment scope. Organisations that rely on VLAN segmentation to isolate their OT/ICS environment, production systems, or financial data are often surprised to find that legacy firewall rules (created years ago for a specific project and never removed) allow direct access between segments that are supposed to be isolated.