project black logo
Penetration Testing

Internal Network Testing.

Assume breach. Simulate genuine insider threats and scenarios like an employee accidentally clicking on that free gift card link. In ~80% of our engagements in 2024 (so far) we've uncovered vulnerabilities that allowed us to go from just network access to Domain Admin.

Our Engagement Process.

T-14 days

Scoping

Our scoping process begins with a detailed consultation to understand your unique business requirements. We identify critical assets and potential threat vectors to tailor a penetration testing plan that aligns with your security goals.

T-7 days

Remote Testing Probe Setup

Our remote testing probes allows us to conduct internal network penetration tests from afar without the need for old-school site visits. Once the device is connected to your network, it automatically dials back to our testing infrastructure with no configuration required on your part.


This approach not only minimises disruptions by allowing for out of hours testing activities but also reduces costs!

Start of Testing

Testing starts! Our certified penetration testers manually search for vulnerabilities to uncover complex attack chains used by advanced threat actors.


Should any critical vulnerabilities be discovered, we communicate these immediately to ensure swift mitigation.

T+14 Days

Report Delivery and Debrief

Upon completion of the testing phase, we deliver a detailed report that outlines all identified vulnerabilities, accompanied by options for remediation.


A key part of our service is the debrief call, where we walk through the report together. This ensures that all findings are fully understood and that the necessary steps for remediation are clearly communicated.

Why Internal Network Testing?

Identify Vulnerabilities

Discover vulnerabilities within the network that may not be visible from the outside. Ensure that the old cupboard PC hasn't been overlooked in your vulnerability management processes.

Verify Security Policies

Identify discrepancies between your policy documentation and actual practices, and ensure that security measures are enforceable and effective in real-world scenarios.

Reduce Insider Threats

Gain visibility of the potential damage a malicious insider could cause, particularly by identifying employees with excessive access privileges.

Enhance Incident Response

Close your organisation's detection gaps. Internal network penetration testing provides an opportunity to test and refine surveillance and alert systems.

Our Network Infrastructure Testing Methodology

Manual assessment forms the bulk of our penetration testing engagements: at least until our AI overlords replace us.

Project Black's high-level approach to assessing networks is adapted from NIST SP 800-115 and Chris McNab's "Network Security Assessment". The methodology aims to add structure to penetration testing engagements such that weaknesses are consistently discovered across various environments.

4 key phases of testing are highlighted below:

  1. Assessing Network Services

    This stage involves a thorough review and validation of network services to identify open ports, running services, enumerating versions and associated vulnerabilities with publicly available exploit code.

  2. Assessing Misconfigurations

    In this step, we examine network and system configurations to uncover insecure settings that could be exploited by attackers. This can include verifying security protocols, authentication/authorisation mechanisms, and various software configurations.

  3. Active Directory Evaluation

    The assessment of Active Directory involves identifying vulnerable configurations like unconstrained delegation, and permission DACLs to identify ways to escalate privileges to domain admin.

  4. Identifying Opportunities for Vulnerability Chaining

    Identifying opportunities to chain exploitation of multiple vulnerabilities can result in greater impact than what's possible with exploitation of standalone findings.

Project Black maintains an extensive repository of internally developed TTPs (Tactics, Techniques, and Procedures) while also drawing upon the wealth of open-source knowledge contributed by the global hacking community.

Ready for a Pentest Quote?

Simply fill out and submit the form, and we'll provide you with a quote within hours - unless you fill it in at 3am!

Contact Us:

  • Privacy Policy (November 2023)
  • This policy outlines how we collect, use, and safeguard your personal information.
  • Information We Collect & How We Use It
  • Contact Form: When you use our contact form, we collect your name, email, and phone number. This is used to respond to your inquiries
  • Microsoft Clarity, Google & Bing Analytics: We use Microsoft Clarity together with Google & Bing Analytics to collect data such as your page views, and visitor behavior on our site. This helps us understand how our website is used to help us improve our site.
  • We do not share your personal data with any third parties, except as necessary for Microsoft Clarity, Google & Bing Analytics analysis, see their privacy policies for more information.
  • Data Security
  • Contact form information is sent via formspree.io as this is a 100% static site to a shared mailbox in Office 365. Access to this mailbox is restricted to specific individuals within our company to ensure the security of your information.
  • formspree.io helps us archive a copy of the form submission where it is retained for 30 days. If you prefer to contact us directly, you can email us at [email protected] for the same purpose.
  • Your Rights
  • You have the right to access, amend, or request the deletion of your personal data. If you have any privacy-related concerns, questions, or requests regarding your personal information, please contact us at [email protected].
  • Changes to Privacy Policy
  • Our privacy policy may be updated periodically. Any changes will be posted here and communicated to individuals who have previously submitted forms.
  • Jurisdiction
  • This privacy policy adheres to the Australian Privacy Principles.