| name | pentest-active-directory |
| description | Assess Active Directory identity attack paths including roasting, relay, and delegation abuse. |
Pentest Active Directory
Stage
- PTES: 6
- MITRE: TA0006, TA0008
Objective
Map and validate AD privilege escalation and movement paths.
Required Workflow
- Validate scope before any active action and reject out-of-scope targets.
- Run only authorized checks aligned to PTES, OWASP WSTG, NIST SP 800-115, and MITRE ATT&CK.
- Write findings in canonical finding_schema format with reproducible PoC notes.
- Honor dry-run mode and require explicit --i-have-authorization for live execution.
- Export deterministic artifacts for downstream skill consumption.
Execution
python skills/pentest-active-directory/scripts/active_directory.py --scope scope.json --target <target> --input <path> --output <path> --format json --dry-run
Outputs
ad-findings.json
ad-attack-paths.json
ad-report.json
References
references/tools.md
skills/autonomous-pentester/shared/scope_schema.json
skills/autonomous-pentester/shared/finding_schema.json
Legal and Ethical Notice
WARNING AUTHORIZED USE ONLY
This skill executes real security testing tools against live targets.
Use only with written authorization.