In-Depth Network Penetration Testing. Extensive efforts will be invested till compromising Domain Controller. Overview of the assessment after signing the Rules of Engagement: - Scoping and reconnaissance - In-Depth scanning - Exploitation (including Client-Side) - Post exploitation and In-Depth password attacks. - Web Application pen-testing on Intranet web applications - Advanced network attacks: --- Bypassing NAC --- OSPF attacks --- Pen-testing cryptographic implementations - Reverse engineering interesting in-scope Linux / Windows binaries and exploitation (if vulnerabilities are identified) - then redirecting code execution after defeating protections like ASLR, DEP etc. [Last option]