Assumed Breach Network Security Assessment
Measure Adversarial Impacts
Controlled lateral-movement exercise to validate segmentation, privilege paths, and XDR/NDR/SIEM detection.
Starting from a foothold you define (e.g., rogue network device, VPN/domain user creds or a test workstation), we emulate a post-compromise attacker to quantify impact. We map and validate privilege-escalation paths, segmentation gaps, and control effectiveness across AD/Windows, identity, and management planes.
Techniques may include command and control (C2) establishment, persistence mechanisms, credential harvesting/safe replay, local privilege escalation, service account abuse, fileshare enumeration, Kerberoasting/AS-REP exposure checks, AD CS misconfigurations, account delegation misconfigurations, simulated data exfiltration and insecure protocol use, all executed under strict Rules of Engagement, to protect production systems and minimize service disruptions.
In parallel, we assess XDR/NDR/SIEM visibility and response:
what tripped, why, how fast, and was anything missed?
Deliverables include successful attack-path diagrams and prioritized remediation guidance for Executives and Security Teams.
Who it’s for
Teams with cloud-first Azure, hybrid AD or on-premesis AD environments wanting evidence of real-world lateral movement risk and adversary tactics/techniques detection performance.
Ready to put your SOC/vendors in the thunderdome?
Schedule a meeting with a LemurSec remote operator!
| Included activities |
|---|
| Segmentation & tiering validation, C2, simulated data exfil |
| Controlled lateral-movement evaluation |
| XDR/NDR/SIEM visibility and response observations |
| Attack-path diagram and prioritized remediation (effort vs. risk) |
| Executive Summary report with a technical appendix |
| Retest specific TTPs and publish updated report |
How it works
- 1ROE & safety planning
- 2Access provisioning
- 3Recon & path analysis
- 4Controlled exploit chaining
- 5Detection/response review
- 6Outbrief
- 7Retest
Answers to common questions
Everything you need to know about our GRC & security assessments, from retests to safety and timelines.
Is this a red team or phishing test?
No. This is a scoped, remote, post-compromise security evaluation.
Will this impact production systems?
We design for safety (throttled, change-controlled, read-only where possible) and schedule off-hours as needed.
Can you test XDR/NDR/SIEM?
Yes! Our internal exploit development resources safely simulate a wide range of both high and low skill adversary techniques to evaluate alerting and response without using destructive malware.