How Neo Solves This
Neo conducts internal network assessments by simulating post-compromise scenarios: starting from a foothold inside your network and systematically testing how far an attacker can go, what they can access, and what damage they can inflict.- Establishes a starting position — Neo begins from a defined entry point inside your network: a compromised workstation, a developer laptop, a container within your cluster, or any segment you want to test from. This simulates realistic breach scenarios where an attacker has already bypassed perimeter defenses.
- Discovers internal services and assets — from the starting position, Neo maps the internal network: identifying reachable hosts, open ports, running services, internal APIs, databases, management interfaces, and infrastructure components. It builds a picture of what’s accessible from the compromised vantage point.
- Tests for privilege escalation — Neo probes internal services for weaknesses that enable escalation: default credentials on management interfaces, misconfigured service accounts, overly permissive IAM roles, unpatched internal services with known CVEs, weak authentication on internal APIs, and exposed secrets in configuration files or environment variables.
- Maps lateral movement paths — when Neo gains access to one internal system, it tests what that access enables. Can it reach other network segments? Can it access databases or secrets stores? Can it pivot from a development environment to production? Neo traces these paths to demonstrate how a single compromise cascades across your internal infrastructure.
- Assesses post-compromise impact — Neo doesn’t stop at proving access. It demonstrates what an attacker can do with that access: extracting sensitive data, modifying configurations, accessing customer records, reaching CI/CD systems, or compromising deployment pipelines. The findings reflect real business impact, not theoretical risk.
- Tests segmentation and controls — Neo validates whether your network segmentation, firewall rules, and access controls actually prevent lateral movement. It identifies gaps where controls are configured but not enforced, where segmentation exists on paper but not in practice, and where trust relationships between services create unintended access paths.
What This Looks Like in Practice
You ask Neo to simulate an internal breach scenario:What You Get
- Realistic breach simulation — testing that starts from a credible internal foothold rather than an external scan, reflecting how real attacks unfold after initial compromise
- Lateral movement mapping — complete documentation of how far an attacker can move from a given starting position, with every hop validated and evidenced
- Privilege escalation paths — confirmed escalation routes through misconfigured services, weak credentials, exposed secrets, and unpatched internal software
- Segmentation validation — evidence of whether your network controls and segmentation actually prevent lateral movement between environments and trust zones
- Real impact demonstration — findings that show what an attacker can access and do, not just which services are reachable, including data exposure, configuration tampering, and pipeline compromise
- Chained attack narratives — multi-step attack paths documented end to end with evidence at each stage, making it clear how individual weaknesses combine into critical exposure
Common Internal Testing Scenarios
Developer Workstation Compromise
Simulates an attacker who has phished a developer or compromised their laptop. Tests what internal systems a developer’s credentials and network position can reach, whether escalation to production systems is possible, and how effective segmentation is between development and production environments.Container Escape and Cluster Pivoting
Starts from a compromised container within your Kubernetes or Docker environment. Tests for container escape paths, access to the node’s host system, cluster-level privilege escalation via misconfigured RBAC, and lateral movement to other workloads, namespaces, or the underlying cloud infrastructure.Post-Phishing Lateral Movement
Simulates the aftermath of a successful phishing attack on a non-technical employee. Tests what an attacker can reach with standard corporate credentials: internal applications, file shares, admin panels, and whether they can escalate from a low-privilege position to systems containing sensitive data.CI/CD Pipeline Compromise
Assesses what an attacker who gains access to your build and deployment infrastructure can do: injecting code into builds, accessing deployment secrets, modifying production configurations, or using the pipeline as a pivot point to reach production systems directly.Trust Boundary Validation
Systematically tests the boundaries between network segments, environments (development, staging, production), and trust zones. Validates that firewall rules, network policies, and access controls prevent unauthorized cross-boundary access in practice, not just in configuration.Setup
To run internal network pentesting:- Configure Neo’s network access to reach your internal environment. This may involve VPN configuration, agent deployment on an internal host, or VPC peering depending on your network architecture. Contact our team for guidance on the best approach for your setup.
- Define the starting position and scope in Settings → Environments — which network segment, host, or role Neo should start from, and which systems are in scope for testing.
- Provide internal credentials via Settings → Environment Variables to simulate specific compromise scenarios (developer credentials, service account tokens, standard employee access).
- Start a new conversation describing the scenario you want to test, or set up a scheduled assessment for recurring internal testing.

