Attacking Enterprise Networks

Introduction Scope, Assumptions, and Recon Strategy An enterprise network assessment usually starts with far less certainty than a lab writeup suggests. In this scenario, the client wanted to know what an anonymous internet user could reach from the DMZ and whether that access could eventually lead to internal compromise, including Active Directory impact. No VPN, web application, or domain credentials were provided, so the attack path had to begin with discovery, validation, and careful prioritization. That is important because an external penetration test is not the same thing as a full web application assessment: the goal is to find realistic footholds and high-impact attack paths, not spend the entire week cataloging every missing security header. ...

May 1, 2026 · 11 min · Miguel Lameiro (lameiro0x)