Eine digitale Wand mit Code aus dem Bereich Cyber Security

Active Directory Penetration Testing

Whether you are a SME or a global corporation - our Active Directory penetration tests provide you with exactly the insights you need to protect your core infrastructure

Why you should put your Active Directory to the test

Active Directory is the backbone of most corporate networks. An attacker who gains control of the domain essentially gains control of the entire company. Active Directory is no longer limited to internal IT networks – it increasingly extends to OT environments and is often closely linked to Azure and Entra ID. Because Active Directory controls authentication and access across your entire organization, it remains a central and critical target for attackers.

As environments evolve – with legacy systems, hybrid configurations and cloud extensions – so do the attack surfaces. Thanks to our many years of experience in the areas of Active Directory and OT, we are able to precisely identify potential attack paths and assess their impact in the real world – whether in IT or OT. In particular, the detection of attack paths that spill over from IT into OT is a central focus of our Active Directory assessments.

Common vulnerabilities in Active Directories

Active Directory often has security-relevant vulnerabilities, as many environments have grown historically and have never been systematically hardened. This makes them an attractive target for attackers.

  • Weak passwords for service accounts
  • Unintended assignment of rights via inherited group memberships
  • Misconfigured authorizations
  • Critical misconfiguration when using AD CS (PKI)
  • Too far-reaching authorizations on network shares with confidential information
  • Missing or insufficiently implemented access model

How we support you

Our Active Directory Penetration Test is designed to identify the real risks within your identity infrastructure – from privilege escalation paths and misconfigurations to inadequately protected, sensitive information (e.g. plain text passwords) or insecure delegation models. Whether on-premises, hybrid with Entra ID or extended to OT environments, we assess your AD ecosystem for vulnerabilities that attackers can exploit to spread across your domain and gain access to sensitive information.

Targeted attack simulations

We simulate the behavior of attackers to uncover vulnerabilities that could put your most important infrastructure at risk – using manual methods and specialized tools that go far beyond automated scans.

Active Directory know-how

With many years of experience in both Active Directory and OT, we can accurately evaluate potential attack vectors and assess their true impact across all your Active Directory environments – whether IT or OT.

Security check of your AD ecosystem

Using an assumed-breach approach, we find out how far attackers can penetrate your Active Directory, regardless of the security of individual clients, e.g. on the basis of an opened phishing email that compromises the client.

Making Active Directory secure –
with the right test package

Our test packages help you to systematically identify and eliminate vulnerabilities in your Active Directory environment. Whether you have a small network or a complex infrastructure – choose the right package for you.

For small to medium-sized AD environments
First security assessment of your Active Directory environment – fast, structured and practical.

Scope of services:

  • Automated hardening test

  • Vulnerability scan of critical servers (incl. DCs)

  • Analysis of user, group and password configurations

  • Check for admin abuse (e.g. missing tiering, password reuse)

  • Manual attack path modeling (basic)

  • AD-CS check (if available)

  • Report with results and measures

Ideal as a starting point for improving your AD security

For medium to large environments
Advanced analysis with a focus on more complex attack vectors and additional components.

Scope of services:

  • All contents of the Essential Test

  • Advanced attack path modeling (manual)

  • Basic check of shared network content

  • Initial assessment of MS SQL, ConfigMgr and Entra Connect (if available)

  • Detailed report with prioritization

Optional add-ons:

  • Password analysis

  • Trust analysis for multiple domains

Ideal for validating measures or gaining a deeper understanding of risk

For complex AD environments with multiple domains or forests
In-depth security assessment – comprehensive, manual and customized.

Scope of services:

  • all content from Essential & Advanced

  • Comprehensive attack path modeling

  • Extended tests of supporting systems (e.g. MS SQL, ConfigMgr)

  • Detailed analysis of intra-/inter-forest trusts

  • Complete report with concrete recommendations for action

Optional add-ons:

  • Password analysis

  • Azure AD / Hybrid Identity Assessment

Ideal for companies with high security requirements or compliance targets

How to protect your Active Directory in OT environments

In our webinar, our experts from Limes Security will show you what you should pay attention to when introducing and securing an Active Directory in OT environments. Find out which risks are particularly critical, how proven IT security mechanisms can be sensibly transferred to OT and which measures are crucial for a secure, practical implementation.

Results of our AD penetration tests

A thorough review of your Active Directory configuration, including user and group configurations, trust relationships, delegation paths and - if available - AD-integrated technologies such as AD CS.

Manual modeling of attack paths to uncover both common and complex paths for expanding access and taking over identities.

Analysis of risks and attack paths in networked AD, Azure and OT environments.

Evaluation of the existing access model, the password policies used and the use of administrative accounts.

Generally increased visibility in your domains and their configuration. Possible legacy issues and authorizations/configurations that are no longer required can thus be detected and evaluated more easily.

A clear, prioritized report with actionable corrective actions tailored to your environment.

Frequently asked questions

How does a penetration test of my Active Directory work?

Basically, a test of your Active Directory (AD) starts like any other pentest at Limes Security. Together with you, the (usually two) testers discuss the objectives and the exact mode of cooperation in a kick-off meeting. All your open questions will be answered and the previously agreed scope and the systems to be tested will be reconfirmed. Any worst-case scenarios that may be of particular interest to you are also discussed. The penetration test itself then takes place, during which it is particularly important for us to remain in close contact with you at all times – for example via a dedicated chat channel. Any questions that arise on both sides can therefore be clarified as quickly as possible, and we will also inform you immediately of any particularly critical vulnerabilities that cannot wait until the official report has been completed. You will receive this report no later than 2 weeks after the end of the penetration test. If desired, a joint final meeting, in which all test results are discussed again, concludes the project.

Can the AD penetration test also be carried out remotely?

What preparations are necessary for the penetration test?

What should be the focus of the test?

I have several domains in use. Can/should they all be tested at the same time?

Will the AD penetration test affect my day-to-day operations?

My Active Directory has already been tested once. Does a new penetration test still make sense?

All systems in my Active Directory correspond to the latest patch level. Should the environment therefore not be secure?

Is the internal perspective useful for an Active Directory test? After all, my perimeter is heavily hardened and I want to know how attackers can access my networks.

Which package is right for me?

Defending what matters

The next cyberattack is coming! Are you prepared for this?