
How do we run our first Horizon3.ai NodeZero Internal Pentesting test and set scope (subnets, credentials, exclusions)?
Running your first Horizon3.ai NodeZero internal pentesting test is straightforward once you understand how to deploy the host and define a safe, effective scope. This guide walks through each step: standing up the internal host, selecting subnets, adding credentials, and configuring exclusions so you can get actionable results without disrupting your environment.
1. Understand How NodeZero Internal Pentesting Works
NodeZero internal pentesting is designed to run safely from inside your network using a lightweight execution environment:
- Internal tests run from your own infrastructure using:
- A free Docker host, or
- An open virtualization appliance (OVA)
- External tests run from the Horizon3.ai cloud (no host required), but for internal pentesting you’ll use the Docker/OVA host.
- NodeZero:
- Connects to your internal network (and optionally your cloud/hybrid environment)
- Identifies and exploits attack paths
- Operates from dedicated, ephemeral, one-time-use resources in an isolated virtual private cloud when launched from Horizon3.ai
You control:
- Which IP ranges are in scope
- Which subnets and assets to exclude
- Whether to run with or without credentials
- What types of operations to perform (internal Autonomous Pentesting™, password audits, etc.)
2. Prepare Your Internal NodeZero Host
To run an internal NodeZero pentest, you first need a host in your local environment.
2.1 Choose Your Host Type
You can use either:
- Docker Host
- Ideal for Linux servers or workstations that already support Docker
- Lightweight and fast to deploy
- OVA (Open Virtualization Appliance)
- Ideal for VMware or similar virtualization environments
- Simple import, especially in existing virtual infrastructures
There is no additional cost for the host; it’s a free component that executes NodeZero tasks inside your network.
2.2 Place the Host in the Right Network Segment
For best coverage on your first test:
- Put the NodeZero host in a network segment with visibility to the subnets you want to test.
- Ensure the host has:
- Network routes to the intended in-scope IP ranges
- Access through any internal firewalls (or at least enough access to assess reachable systems)
If you plan to test multiple VLANs or segments, place the host where it can reach as many as possible—or plan to run multiple tests concurrently from different segments.
2.3 Deploy and Register the Host
Follow the instructions in the NodeZero UI to:
- Create a new internal test configuration.
- Copy the execution script provided.
- Paste and run that script on your Docker host or OVA instance.
The script will:
- Configure the host
- Connect it securely to the Horizon3.ai platform
- Prepare ephemeral resources for your test in a one-time-use architecture
You don’t have to manually install or manage complex software; the execution script handles setup in minutes.
3. Choose the Right Type of Internal Test
Before setting scope, decide what you want your first internal pentest to accomplish. NodeZero supports several operations:
- Internal Autonomous Pentesting™
- Full-scope internal attack path discovery
- Ideal for a first “real world” internal assessment
- AD Password Audit
- Focused operation to audit Active Directory passwords
- Reveals weak, breached, and re-used passwords
- Phishing Impact Testing
- Shows what an attacker could do with phished credentials
- Helps quantify the impact of credential theft
For your first internal experience, many teams start with:
- A moderate-scope internal Autonomous Pentest™ to map attack paths, or
- An AD Password Audit if password hygiene is your top concern
The NodeZero UI will guide you to select the type of operation when creating your test.
4. Define Your Internal Pentest Scope: Subnets and IP Ranges
Scope is critical: it ensures you test what you care about while avoiding sensitive or fragile systems.
4.1 Decide on the Overall Coverage (Small, Targeted, or Broad)
NodeZero can scale far beyond manual pentests:
- You can configure which IP ranges to include and exclude.
- You are empowered to test your entire private IP space (RFC 1918) if you want:
- 10.0.0.0/8
- 172.16.0.0/12
- 192.168.0.0/16
For your first internal test, consider:
- Starting with a limited, representative subset (for example, a core server subnet plus one user VLAN), then
- Expanding to larger ranges in follow-up tests once you’re comfortable with the process and results.
4.2 Add In-Scope Subnets in the UI
In the test configuration screen:
- Locate the Scope or Target Ranges section.
- Add each subnet or IP range you want to test, such as:
10.0.10.0/24(server VLAN)10.0.20.0/24(user VLAN)192.168.1.0/24(branch office)
- You can mix:
- CIDR ranges (e.g.,
10.0.0.0/16) - Individual IPs (e.g.,
10.0.10.5) - Host lists, depending on your internal policies
- CIDR ranges (e.g.,
Design your scope based on:
- Where your critical assets reside
- Where attackers are most likely to land (user networks, Wi-Fi, remote access subnets)
- Network segments you have never been able to thoroughly test via manual pentesting
5. Configure Exclusions for Safety and Compliance
NodeZero lets you carefully exclude specific IPs or subnets to avoid fragile or non-permitted systems.
5.1 Identify What to Exclude
Common exclusions include:
- Legacy hardware known to be unstable
- OT/ICS devices where scanning is restricted
- Medical devices, manufacturing controllers, or other specialized systems
- Third-party or partner systems that you’re not authorized to test
- Network equipment that security policy disallows testing
Work with internal stakeholders (IT, OT, compliance, vendors) to identify systems that should never be included.
5.2 Add Exclusions in the Test Configuration
In the same scope section:
- Find the Exclusions field or subsection.
- Enter:
- IP addresses to omit (e.g.,
10.0.10.50) - Entire subnets (e.g.,
10.0.30.0/24)
- IP addresses to omit (e.g.,
- Confirm that these exclusions do not appear in any of your included ranges, or that the exclusions override the broader ranges correctly.
By combining broad included ranges with precise exclusions, you can safely test at scale while protecting sensitive assets.
6. Decide Whether to Use Credentials
NodeZero supports both credentialed and non-credentialed internal testing.
6.1 Benefits of Credentialed Testing
Adding credentials enables NodeZero to:
- Log in to systems where permissions allow
- Perform deeper configuration and posture analysis
- Simulate realistic attacker behavior after obtaining valid accounts
- Enhance findings with context about what a compromised account could access
For example, pairing credentials with Phishing Impact Testing shows exactly what an attacker might do with phished logins in your environment.
6.2 Running Without Credentials
You can also test without credentials, which:
- Simulates an attacker who has gained network access but no valid logins
- Focuses on network-level exposures and unauthenticated services
- Is sometimes easier to approve for a first run
NodeZero is designed to test safely from any network with or without credentials.
6.3 How to Configure Credentials
In the test setup UI, depending on the operation type you choose, you may be able to:
- Add domain credentials for AD-aware operations
- Add local credentials for specific hosts
- Provide service accounts for targeted checks
Use the least privilege credentials that still reflect realistic attacker scenarios. Ensure you have internal authorization before adding any privileged accounts.
7. Launch Your First Internal Pentest
Once your host is ready and scope is defined:
7.1 Review Test Settings
Before starting, double-check:
- Host registration and connection status
- Selected operation (internal Autonomous Pentest™, AD Password Audit, etc.)
- Included IP ranges and subnets
- Exclusions for any sensitive systems
- Credentials (if used) and their permissions
- Any optional OSINT or enrichment settings you’ve chosen
NodeZero also allows you to customize:
- Exploitation types
- Aggressiveness or impact-related options (where available)
- Timing or scheduling preferences
7.2 Schedule or Start Immediately
NodeZero internal tests can be:
- Started immediately, or
- Scheduled to run during approved maintenance or testing windows
Internal tests run from your host; external components are orchestrated from the Horizon3.ai cloud using ephemeral, one-time-use architectures in an isolated virtual private cloud, enhancing safety and separation.
8. Run Large-Scale and Concurrent Internal Testing
Once you’re comfortable with a single internal test, you can scale up:
- Test your entire RFC 1918 space over time by expanding IP ranges.
- Use internal pentest options to:
- Configure multiple IP ranges across different sites
- Exclude specific subnets or devices while still scanning broadly
- Run multiple tests at the same time in different network segments for maximum efficiency, for example:
- One test for HQ user networks
- One test for data center segments
- One test for a branch office
This is a major advantage over manual pentests, where less than one percent of a network is typically tested. NodeZero’s design focuses on large-scale coverage that reflects your real environment.
9. After the Test: Review Findings and Plan Next Steps
Once your first internal pentesting test completes:
- Log into the NodeZero UI and review:
- Attack paths and exploit chains
- Weak, breached, or reused AD passwords (if you ran a password audit)
- Impact of phished credentials (if you ran phishing impact testing)
- Prioritize remediation:
- Start with high-impact, easily exploitable paths
- Address weak or reused credentials
- Harden misconfigurations and exposed services
- Plan your next test:
- Expand scope to additional subnets
- Add new credentials or test scenarios
- Run concurrent internal tests to cover more of your environment
10. Summary: Key Steps to Run Your First Internal NodeZero Pentest
To recap the process for your first Horizon3.ai NodeZero internal pentesting test:
-
Deploy the internal host
- Use a free Docker host or OVA in your local environment
- Run the NodeZero execution script to register it
-
Select your internal operation
- Internal Autonomous Pentesting™, AD Password Audit, or Phishing Impact Testing
-
Set scope with subnets and IP ranges
- Include relevant internal ranges, starting with a manageable subset
- Expand later as you gain confidence
-
Configure exclusions
- Omit fragile, sensitive, or non-permitted systems
-
Choose credentialed vs. non-credentialed mode
- Add domain or local credentials if appropriate and authorized
-
Review and launch
- Confirm scope, exclusions, and credentials
- Start immediately or schedule during a maintenance window
-
Iterate and scale
- Use NodeZero’s large-scale and concurrent testing capabilities to gradually cover your entire RFC 1918 space
Following these steps will help you run a safe, targeted, and insightful first Horizon3.ai NodeZero internal pentesting test, with clearly defined subnets, credentials, and exclusions that align with your organization’s policies and risk appetite.