Macksofy Technologies
India BFSI engagement guide

Active Directory Penetration Testing in India — A 2026 Buyer's Guide

What an Active Directory pentest looks like for Indian BFSI, government and enterprise — scope, methodology, tooling, deliverables, pricing, and how to evaluate vendors.

Active Directory VAPT BFSI India
Macksofy Editorial· CERT-In empanelled8 March 2026 13 min read
Forest RootMUMBAIDUBAI!CERT-In Empanelled82% engagements → Domain Admin
AD

Internal Active Directory environments are the most consistently exploitable surface in Indian enterprises. Across 200+ engagements at Macksofy, we have escalated to Domain Admin in over 80% of in-scope environments — usually within the first 48 hours. This guide explains what a serious AD pentest looks like in 2026, what to scope, what to expect in the report, and how to pick a vendor that delivers depth instead of a Nessus PDF.

Phishinginitial accessWorkstationdomain userBloodHoundmap pathsKerberoastcrack offlineTier-1 Adminlateral moveDomain AdminDCSyncpathcreds
The compromise path most engagements actually follow

Why AD-specific testing matters in India

RBI's Cyber Security Framework, SEBI's CSCRF, and CERT-In's audit guidelines all require organizations to test their internal network — not only the perimeter. AD is the centre of every Windows-based corporate network. Cooperative banks, NBFCs, listed manufacturers, government departments and mid-market SaaS companies in India almost universally run AD as the identity foundation. A perimeter-only test misses the actual breach pattern: phishing → workstation foothold → AD compromise → data theft → ransomware.

82%
Engagements where we reach Domain Admin
47h
Median time to first DA finding
73%
DA paths that involve Kerberoasting
11
Median high-sev findings per AD scope

What 'in scope' should mean

  • All in-scope domain controllers and tier-0 systems
  • All standard user-tier workstations (sample) for assumed-breach perspective
  • AD Certificate Services, Federation Services, MS Exchange (where present)
  • Azure AD / Entra ID where there is hybrid sync
  • Sensitive shares (SYSVOL, NETLOGON, app shares)
  • Group Policy Objects and their permissions

Methodology — what we actually do

DayActivityOutput
1Recon, BloodHound collection, DC enumerationDomain map, user list
2Kerberoast, AS-REP, weak password identificationCracked credentials
3ACL abuse, GPO abuse, ADCS attacksLateral movement paths
4Lateral movement, local privilege escalationTier-1 admin access
5Domain Admin escalation, krbtgt extraction (proof only)DA confirmation
6Sensitive data discovery, exfil simulationData sensitivity findings
7Cleanup, debrief, draft reportEngagement closeout

Typical 7-day AD engagement schedule

Tooling we use

CategoryTools
ReconBloodHound, SharpHound, PowerView, ldapsearch
Kerberos abuseRubeus, impacket-GetUserSPNs, kerbrute
ACL abusePowerView, BloodyAD, certipy
ADCS attackscertipy, Certify
Lateral movementimpacket, evil-winrm, RemotePotato0, NoPac
Crackinghashcat (RTX 4090 cluster)
ReportingGhostWriter, Macksofy templates

What a serious AD report contains

  • Executive summary with risk-on-business framing (board-ready, 2-3 pages)
  • Findings register: severity, CVSS, business impact, remediation effort
  • Attack-chain narrative — every DA path documented as a kill-chain
  • Proof-of-concept screenshots and command logs for each finding
  • MITRE ATT&CK mapping for every TTP used
  • Developer- / sysadmin-friendly remediation steps with config examples
  • 30-day free retest commitment
  • CERT-In format compliance for regulated entities

Pricing in India (2026)

ScopeEffortIndicative price
Single domain, <200 users5 working days₹3.5–6 lakh
Single forest, <2000 users7-10 working days₹6–12 lakh
Multi-forest, hybrid Entra ID10-15 working days₹12–22 lakh
Annual retainer (4 engagements)Per cycle₹40–70 lakh

How to evaluate a vendor

  1. CERT-In empanelled? (Mandatory for RBI / SEBI / UIDAI entities)
  2. Show me a sanitized AD pentest report — does it have attack-chain narratives?
  3. What's the OSCP / OSEP / CRTO concentration on the team?
  4. Will the same consultants run my engagement, or is it offshored to L1 staff?
  5. Free retest within 30 days included?
  6. Will you walk my admins through every finding personally?
Train with Macksofy

Our Active Directory engagement is one of several hands-on tracks Macksofy delivers across India and the UAE. CERT-In empanelled, OffSec/EC-Council authorized, with weekend cohorts and corporate batches.

View training catalog
FAQ

Quick answers.

Risk is low when scoped correctly. We avoid destructive actions (no DCShadow, no actual Golden Tickets, no krbtgt resets) — every escalation is proven once and documented, not weaponized.
Talk to us

Get a fixed-price proposal in 48 hours.

Tell us about your security need — pentest, audit, training or a wider engagement. A senior consultant will reply within a few business hours.

CERT-In Empanelled
Information Security Auditor · India
  • CERT-In Empanelled
  • EC-Council ATC · CompTIA Authorized
  • 20,000+ professionals trained
  • India + UAE engagements
Human verification· Cloudflare Turnstile

By submitting this form you agree to be contacted by Macksofy. We typically respond within a few business hours and never share your details. Protected by Cloudflare Turnstile and rate limiting.