80% of all cyberattacks exploit Active Directory vulnerabilities (Source: Mandiant Threat Report 2025). Assess your identity infrastructure for:
✅ Privilege escalation (e.g., Kerberoasting, Pass-the-Hash)
✅ Domain takeover (Golden Ticket, DC-Sync)
✅ ADFS misconfigurations (Token Replay, MFA bypass)
✅ Compliance risks (GDPR, BSI KRITIS, ISO 27001)
Active Directory is the Core of Your IT — and the Prime Target for Attackers
Ransomware campaigns abuse AD for lateral movement
Data breaches occur via insecure group policies and outdated protocols
Compliance violations under GDPR Article 32, BSI KRITIS, and NIS2
Operational outages triggered by compromised domain controllers
Fact: 9 out of 10 organizations have critical Active Directory vulnerabilities — many remain undetected for years
We test against AD Security Guidelines, MITRE ATT&CK for Active Directory, and Microsoft Hardening Baselines:
✔ In-depth AD penetration tests (On-Prem, Hybrid, Azure AD)
✔ ADFS security assessments (SAML, OAuth, MFA bypass)
✔ Red Team / Blue Team training with real-world attack scenarios
✔ Audit-ready compliance evidence (GDPR, BSI, KRITIS)
All assessments follow Microsoft AD Security Baselines and MITRE ATT&CK for Active Directory.
“We need an AD pentest for BSI KRITIS / NIS2.”
“Our AD has grown — but no one knows who has which rights.”
“How do I defend against ransomware using AD as an entry point?”
GDPR Article 32: Security of processing
BSI KRITIS: Identity management requirements
NIS2: Risk management for critical infrastructure
~65–90 AD test cases (depending on environment complexity)
25–35 ADFS-specific assessments
Risk ratings based on CVSS v3.1
Prioritized AD hardening roadmap
Board-ready presentation: Security ROI made tangible
✅ Verified compliance (GDPR, BSI, ISO 27001)
✅ Up to 90% reduction in AD attack surface
✅ Ransomware resilience through AD isolation
“How can I tell if our AD is already compromised?”
“We have outdated Group Policies — but where do we even start?”
“Our team needs to detect AD attacks — how do we train for that?”
Automated scans with your IT team (BloodHound, PingCastle, Purple Knight)
Manual tests for:
• Kerberoasting (SPN abuse)
• Pass-the-Hash / Ticket attacks (lateral movement)
• ACL misconfigurations (unauthorized permissions)
• ADFS vulnerabilities (token-signing certs, MFA bypass)
2–4 day workshops with real-world attack simulations
• Red Team: Simulate attacks like APT29 (Cozy Bear)
• Blue Team: Detect & respond using SIEM tools (Splunk, Microsoft Sentinel)
• CTF Events: "Capture the Flag" using real AD labs (GoAD, DBCC)
Detect Golden Ticket attacks
Defend against DC-Sync and DCSync
Secure ADFS & MFA configurations
Tiered Admin Model (Tier 0/1/2)
LSASS protection (run LSASS as a protected process)
ADFS security (SAML signing, Extensible Authentication)
Real-world scenarios — no theory!
Domain takeover in 5 steps
Persistence techniques (Golden Ticket, DCShadow)
ADFS attacks (Token manipulation)
Detection using SIEM (Splunk, Microsoft Sentinel)
Incident response to AD compromise
Post-attack forensics and analysis
2–4 day intensive workshops (on-site or remote)
CTF events (team competitions with prizes)
Quarterly Red Team exercises (for continuous improvement)
🔹 Realistic AD environments — not slide decks
🔹 Certificates for participants (e.g., “AD Red Team Practitioner”)
🔹 Customizable to your industry-specific threats (e.g., finance, healthcare)
Our combined methodology is relentless — it tests every AD/ADFS weakness, from reconnaissance to business impact. Perfect for assessing your current security posture and prioritizing next steps.
Q: How long does an AD/ADFS penetration test take?
A: 2–4 weeks, depending on the size and complexity of the environment.
Q: What does an AD pentest cost?
A: €12,000–€57,000 — flat rate for standard environments; complex hybrid AD setups priced based on effort.
Q: Can you test Azure AD as well?
A: Absolutely. We assess Hybrid AD, Azure AD Connect, and Conditional Access configurations.
Q: How often should we test Active Directory?
A: At least once per year, plus after major changes (e.g., M&A, cloud migrations).
Q: Does the pentest meet regulatory requirements?
A: Yes. Our reports are aligned with relevant compliance standards.
Q: What’s the difference between an AD and an ADFS pentest?
A:
AD Pentest: Focus on domain controllers, group policies, and permissions
ADFS Pentest: Focus on federation services, SAML/OAuth, and MFA configurations
Q: Can you support our SOC with AD monitoring?
A: Yes — we offer SIEM tuning for accurate AD attack detection.
🔹 AD/ADFS experts since 2016 — we know every attack path
🔹 Training led by real-world hackers (OSCP, OSEP, CRTO certified)
🔹 Deep German compliance expertise (GDPR, BSI, KRITIS, ISO 27001 & IT-Grundschutz)
AD/ADFS-Pentests per year
Cracked passwords per year
One password to rule them all: Start2025!