Skip to content

websec/Infrastructure-Pentest-Test-Cases-Baseline

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

22 Commits
 
 
 
 
 
 

Repository files navigation

Baseline for Infrastructure Penetration Testing

Infrastructure Pentest

For those who want to perform a proper infrastructure pentest, here is a structured and realistic baseline.

This repository contains an AttackForge Reporting compatible Test Suite for Infrastructure and Active Directory test cases, designed specifically for internal infrastructure assessments and red team engagements.

The focus is strictly on:

  • Active Directory security testing
  • Windows domain environments
  • AD CS and PKI abuse
  • Kerberos and NTLM attack paths
  • Delegation and ACL abuse
  • Lateral movement primitives
  • Credential access techniques
  • SCCM, MSSQL, and Exchange related AD abuse
  • Infrastructure misconfigurations and protocol weaknesses

Important Note on Methodology

This repository is not intended to be used as a rigid checklist or compliance framework.

In real-world infrastructure engagements, there is rarely enough time to execute every possible technique against every asset. Attempting to do so is unrealistic and does not reflect how professional infrastructure pentesting is performed.

A proper infrastructure assessment is reconnaissance-driven and attack-path focused.

The correct approach is:

  • Perform thorough reconnaissance
  • Identify trust relationships, privilege boundaries, and architectural weaknesses
  • Map realistic attack paths
  • Execute techniques that are relevant to those paths

The test cases in this repository should therefore be viewed as documented attack primitives and potential attack paths, not mandatory steps.

They exist to ensure coverage, consistency, and reporting clarity. They do not replace the judgment and methodology of the pentester.

Use this baseline as a reference library of techniques that may be applicable depending on the findings during reconnaissance and enumeration.

Purpose

This project provides:

  • A structured and standardized infrastructure pentest baseline
  • Complete AD attack surface coverage checklist
  • Reporting-ready JSON format compatible with AttackForge
  • A methodology aligned with modern offensive tradecraft
  • A continuously extensible test suite

The goal is to prevent incomplete AD testing and ensure consistency across engagements.

Scope of Coverage

Network and Protocol Abuse

  • LLMNR, NBT-NS, mDNS poisoning
  • DHCPv6 and DNS spoofing
  • WPAD abuse
  • NTLM relay preconditions
  • Coerced authentication techniques
  • SMB and LDAP signing weaknesses

Active Directory Enumeration

  • BloodHound collection and attack path analysis
  • LDAP, RPC, SMB enumeration
  • Trust relationship mapping
  • SYSVOL and GPO review
  • AD CS discovery

Credential Access

  • AS-REP roasting
  • Kerberoasting
  • Targeted Kerberoasting
  • Password spraying
  • LSASS dumping feasibility
  • SAM and LSA extraction
  • DPAPI secret recovery
  • DCSync validation

ACL and Object Abuse

  • GenericAll, GenericWrite, WriteDACL, WriteOwner
  • ForceChangePassword
  • Group membership abuse
  • SPN manipulation
  • MachineAccountQuota abuse
  • Shadow Credentials
  • Resource-based Constrained Delegation

Delegation Attacks

  • Unconstrained delegation
  • Constrained delegation
  • Protocol transition abuse
  • Resource-based constrained delegation
  • Bronze Bit exposure
  • NoPAC exposure

AD CS Abuse

  • ESC1 through ESC16
  • NTLM relay to certificate enrollment
  • Weak template configurations
  • Certificate mapping misconfigurations
  • Pass the Certificate
  • Golden Certificate risk
  • Certifried exposure

Lateral Movement

  • Pass the Hash
  • Overpass the Hash
  • Pass the Ticket
  • WMI execution
  • WinRM execution
  • DCOM execution
  • Scheduled Task execution
  • MSSQL abuse
  • SCCM abuse

Persistence and Advanced Techniques

  • Golden Ticket validation
  • Silver Ticket validation
  • Diamond and Sapphire ticket scenarios
  • RODC considerations
  • AdminSDHolder abuse
  • DCShadow exposure
  • SIDHistory injection

Design Principles

This test suite is:

  • Modular
  • Enumeration-driven
  • Abuse-focused
  • Impact validated
  • Reporting-ready
  • Technique-aligned

Each test case is:

  • Structured
  • Mapped to a known attack primitive
  • Tagged for categorization
  • Tool-referenced
  • Methodology-aligned

Reporting Compatibility

The JSON structure is designed to be:

  • Directly importable into AttackForge
  • Easy to extend
  • Cleanly sortable
  • Suitable for enterprise reporting workflows

Contributing

If:

  • A new AD CS technique is published
  • A new Kerberos bypass appears
  • A new delegation edge case is discovered
  • A new enterprise abuse primitive emerges

Or:

  • You want to improve or expand the coverage

You are encouraged to:

  1. Open an issue
  2. Submit a pull request
  3. Improve or extend existing test cases

Keep the structure consistent and aligned with infrastructure pentesting.

Ethical Use

This baseline is intended for authorized:

  • penetration testing
  • red teaming
  • lab research
  • defensive validation

Use responsibly and only with explicit authorization and in accordance with local laws.

Credits

Primary technical references:

These resources provide the foundation for modern Active Directory offensive research and methodology.

About

A Proper Baseline for Infrastructure Penetration Testing

Topics

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published