Abstract
This article documents a groundbreaking black box penetration test orchestrated entirely by Cursor AI (an advanced AI coding assistant) integrated with HexStrike-ai MCP (Model Context Protocol) tools. Unlike traditional manual or scripted penetration tests, this assessment demonstrates how artificial intelligence can autonomously discover, analyze, and exploit an unknown target environment, making real-time decisions and self-correcting when encountering issues.
Critical Context: This was a true black box assessment — the only information provided was a single IP address (192.168.56.10). Cursor AI had no prior knowledge of:
- Whether the target was a Domain Controller
- If Active Directory was present
- What services were running
- What operating system was in use
- Any credentials or domain information
The entire penetration test was initiated with a single human language prompt and executed completely autonomously, with Cursor AI discovering the environment, identifying it as an Active Directory domain controller, and then systematically exploiting it. All strategic decisions, error handling, and troubleshooting were performed automatically without human intervention.
If you like this research, buy me a coffee (PayPal) — Keep the lab running
Table of Contents
- Introduction
- Technology Stack: HexStrike MCP
- AI-Driven Methodology
- Phase 1: Network Discovery
- Phase 2: SMB Enumeration
- Phase 3: User Enumeration
- Phase 4: Credential Discovery
- Phase 5: Authenticated Enumeration
- Phase 6: Advanced Exploitation
- AI Decision-Making Process
- Results and Findings
- Conclusion
Introduction
The Black Box Challenge
This penetration test was conducted as a complete black box assessment — meaning Cursor AI started with zero knowledge about the target. The only information provided was a single IP address.
Initial State (Unknown to AI):
- ❓ Is this a Domain Controller?
- ❓ Is Active Directory present?
- ❓ What services are running?
- ❓ What operating system?
- ❓ What domain name?
- ❓ Any credentials available?
Final State (Discovered by AI):
- ✅ Domain Controller identified
- ✅ Active Directory environment mapped
- ✅ Complete domain structure enumerated
- ✅ All credentials extracted
- ✅ Full domain compromise achieved
The Single-Prompt Black Box Penetration Test
This entire black box penetration test was initiated with one simple human language prompt:
"Do deep blackBox pentest on target 192.168.56.10. USE MCP Hexstrike. Do All needed troubleshooting"
From this single instruction, Cursor AI:
- Discovered the target environment from scratch
- Identified it as an Active Directory domain controller
- Enumerated all services, users, and domain structure
- Exploited vulnerabilities systematically
- Handled all errors and troubleshooting autonomously
- Adapted strategies based on discoveries
- Generated comprehensive reports and articles
No manual intervention was required — Cursor AI orchestrated everything using HexStrike-ai MCP tools and direct tool execution, discovering the entire environment from a single IP address.
Target Configuration (Discovered During Assessment)
Target: 192.168.56.10 (initially unknown) Domain: sevenkingdoms.local (SEVENKINGDOMS) — discovered during enumeration Hostname: KINGSLANDING — discovered during enumeration Assessment Date: 2026–01–26 Execution Method: Fully automated black box via Cursor AI + HexStrike-ai MCP Assessment Type: Black Box (zero prior knowledge)
Lab Environment Setup
Manual PenTest of the same lab here:
Target Environment
How this environment was deployed:
Or here:
Technology Stack: Cursor AI and HexStrike-ai MCP
Cursor AI: The Autonomous Orchestrator
Cursor AI is an advanced AI coding assistant that combines large language models with code understanding capabilities. In this assessment, Cursor AI served as:
- Strategic Planner: Analyzing the single prompt and creating comprehensive attack plans
- Command Executor: Running tools via HexStrike-ai MCP and direct execution
- Result Analyzer: Interpreting output and making intelligent decisions
- Problem Solver: Automatically troubleshooting errors and adapting strategies
- Report Generator: Creating comprehensive documentation
Key Capabilities:
- Natural language understanding of security objectives
- Real-time error analysis and self-correction
- Context-aware decision making
- Multi-tool orchestration
- Autonomous troubleshooting without human intervention
HexStrike-ai MCP: The Tool Integration Layer
HexStrike-ai MCP (Model Context Protocol) provides a standardized interface for security tools, enabling Cursor AI to interact with penetration testing tools programmatically. MCP allows:
- Tool Discovery: AI can discover available security tools
- Standardized Execution: Consistent interface across different tools
- Result Parsing: Structured output for AI analysis
- Error Handling: Standardized error reporting for automated troubleshooting
HexStrike-ai MCP Tools Used
- mcp_hexstrike-ai_nmap_scan — Network port scanning
- mcp_hexstrike-ai_enum4linux_scan — SMB enumeration
- mcp_hexstrike-ai_nbtscan_netbios — NetBIOS discovery
- mcp_hexstrike-ai_netexec_scan — Modern SMB enumeration (CrackMapExec/NetExec)
- Additional tools — Comprehensive AD assessment
Integration Architecture
┌─────────────────────────────────────────────────────────┐
│ Cursor AI │
│ (Strategic Planning, Decision Making, Orchestration) │
│ (Autonomous Troubleshooting, Adaptive Learning) │
└────────────────────┬────────────────────────────────────┘
│
│ Single Human Prompt
│ "Run full real flow on 192.168.56.10"
│
┌────────────────────▼────────────────────────────────────┐
│ HexStrike-ai MCP Layer │
│ (Tool Discovery, Execution, Result Parsing) │
│ (Error Handling, Status Reporting) │
└────────────────────┬────────────────────────────────────┘
│
┌────────────┼────────────┐
│ │ │
┌───────▼───┐ ┌──────▼──────┐ ┌──▼──────────┐
│ Nmap │ │ Enum4linux │ │ Impacket │
│ Tools │ │ Tools │ │ Tools │
└───────────┘ └─────────────┘ └─────────────┘Black Box Methodology
The Discovery-First Approach
Unlike traditional penetration tests where the target environment is known, this assessment followed a true black box methodology — starting with zero knowledge and discovering everything through systematic enumeration.
The Single-Prompt Black Box Assessment Flow
The entire black box penetration test was initiated with one human prompt and executed completely autonomously:
Human Input:
└─ Single Prompt: "Do deep blackBox pentest on target 192.168.56.10. USE MCP Hexstrike. Do All needed troubleshooting"
Cursor AI Processing (Black Box Discovery):
├─ 1. Initial Reconnaissance (Unknown Target)
│ ├─ AI starts with: Only IP address 192.168.56.10
│ ├─ No assumptions about target
│ └─ AI analyzes: "Need to discover what this target is"
│
├─ 2. Network Discovery Phase
│ ├─ Port scanning to discover services
│ ├─ Service version detection
│ ├─ OS fingerprinting
│ └─ AI discovers: Open ports, services, potential OS
│
├─ 3. Service Identification Phase
│ ├─ Analyze discovered services
│ ├─ Identify service types (SMB, LDAP, Kerberos, DNS)
│ ├─ AI recognizes: "This looks like a Domain Controller!"
│ └─ AI adapts: "Switch to AD-specific enumeration"
│
├─ 4. Active Directory Discovery
│ ├─ SMB enumeration to discover domain
│ ├─ LDAP enumeration to discover structure
│ ├─ DNS enumeration for domain information
│ └─ AI discovers: Domain name, hostname, AD structure
│
├─ 5. User and Credential Discovery
│ ├─ User enumeration (Kerbrute, LDAP)
│ ├─ Password attacks (spraying, Kerberoasting, AS-REP)
│ └─ AI discovers: Valid users and credentials
│
├─ 6. Authenticated Enumeration
│ ├─ Use discovered credentials
│ ├─ Complete AD enumeration
│ └─ AI discovers: Full domain structure, all users, groups
│
├─ 7. Exploitation Phase
│ ├─ DCSync attack with discovered credentials
│ ├─ Extract all domain credentials
│ └─ AI achieves: Complete domain compromise
│
├─ 8. Autonomous Troubleshooting (Robust & Automated)
│ ├─ Detect errors or failures automatically
│ ├─ Analyze root cause intelligently
│ ├─ Attempt multiple automatic fixes
│ ├─ Try alternative tools/methods
│ ├─ Adapt strategy dynamically based on discoveries
│ └─ Continue execution despite failures
│
├─ 9. Adaptive Learning
│ ├─ Update understanding based on discoveries
│ ├─ Modify approach based on target type identified
│ ├─ Learn from failures
│ └─ Optimize tool usage for discovered environment
│
└─ 10. Report Generation
└─ AI synthesizes all discoveries and findings into comprehensive reportsKey Innovation: Black Box Discovery + Zero Human Intervention
What makes this revolutionary:
- True Black Box: Started with zero knowledge, discovered everything
- Environment Detection: AI automatically identified AD environment
- Adaptive Strategy: Methodology adapted based on discoveries
- Single Prompt Execution: Entire black box pentest from one instruction
- Autonomous Decision Making: AI makes all strategic decisions
- Robust Error Handling: Automatic troubleshooting without human help
- Self-Adaptation: AI modifies approach based on findings
- Complete Automation: No manual steps required
Phase 1: Network Discovery
AI Planning Process
Initial Analysis:
The automated framework analyzed the requirements and created a comprehensive network discovery plan.
Tool Selection:
The framework selected HexStrike MCP tools for network scanning:
mcp_hexstrike-ai_nmap_scanfor comprehensive port scanningmcp_hexstrike-ai_nbtscan_netbiosfor NetBIOS discovery
Execution:
# AI-generated execution via HexStrike MCP
mcp_hexstrike-ai_nmap_scan(
target="192.168.56.10",
scan_type="-sV",
ports="1-1000",
additional_args="-sC"
)Results:
- 14 open ports identified
- Domain: sevenkingdoms.local discovered
- Hostname: KINGSLANDING identified
- Services: DNS, HTTP, Kerberos, LDAP, SMB, WinRM
AI Decision: Confirmed as Domain Controller. Proceed with AD-specific enumeration.
Phase 2: Active Directory Discovery via SMB Enumeration
Black Box AD Environment Discovery
AI Context: After Phase 1, AI discovered ports suggesting AD, but still needed to confirm and gather domain information.
AI Tool Selection:
Cursor AI automatically selected HexStrike-ai MCP tools for SMB enumeration to discover AD details:
# AI-executed via HexStrike-ai MCP for AD discovery
mcp_hexstrike-ai_enum4linux_scan(
target="192.168.56.10",
additional_args="-a"
)
mcp_hexstrike-ai_nbtscan_netbios(
target="192.168.56.10"
)Black Box Discoveries (Previously Unknown):
- Domain: SEVENKINGDOMS discovered (not known before)
- Domain SID: S-1–5–21–3262952663–1425775882–330886615 extracted (not known before)
- Hostname: KINGSLANDING identified (not known before)
- Domain Controller: Confirmed through SMB enumeration
- SMB Signing: Enabled and required (AI noted as good security practice)
AI Decision (Adaptive): "Confirmed: This is an Active Directory domain controller. SMB signing enabled means MITM attacks won't work. I need to focus on credential-based attacks and Kerberos-based enumeration."
Black Box Achievement: AI confirmed AD environment and discovered domain name without prior knowledge.
Phase 3: User Enumeration
Kerbrute User Enumeration
Tool: Kerbrute
Results:
- 5 valid usernames discovered:
- Administrator
- administrator
- TestAdmin
- TestUser
- vagrant
AI Decision: Proceed with password attacks against discovered users.
Phase 4: Credential Discovery
Password Spraying
Strategy: Test common passwords against all discovered users
Results:
Administrator:8dCT-DJjgScp✅TestUser:Password123!✅vagrant:vagrant✅
AS-REP Roasting
Tool: Impacket GetNPUsers
Results:
- TestUser vulnerable (no pre-authentication required)
- Hash extracted:
[email protected]:...
AI Decision: TestUser account is vulnerable to AS-REP Roasting. Extract hash for cracking.
Kerberoasting
Tool: Impacket GetUserSPNs
Results:
- 4 service accounts vulnerable:
- SQLService
- WebService
- FileService
- ExchangeService
- 4 Kerberos hashes extracted
AI Decision: Service accounts can be Kerberoasted. Extract hashes for password cracking.
Phase 5: Authenticated Enumeration
LDAP Domain Dump
Tool: ldapdomaindump
Credentials Used: Administrator:8dCT-DJjgScp
Results:
- Complete domain structure mapped
- All users enumerated (26 users)
- All groups enumerated
- All computers enumerated
- OU structure documented
AI Decision: With valid credentials, perform comprehensive AD enumeration to understand full domain structure.
Phase 6: Advanced Exploitation
DCSync Attack
Tool: Impacket secretsdump
Credentials Used: Administrator:8dCT-DJjgScp
Results:
- ✅ Complete domain credential database extracted
- 27 user NTLM hashes obtained
- krbtgt hash extracted:
1c455e2c1f50aa2c4c0fb3d14188ee65 - Kerberos AES keys extracted for all users
Critical Finding: krbtgt hash enables Golden Ticket attacks for persistent domain access.
AI Decision: DCSync successful. Extract all credentials for complete domain compromise.
AI Decision-Making Process
Autonomous Decision Examples
Decision 1: Network Discovery Strategy
- Trigger: Initial prompt received
- AI Decision: Start with comprehensive Nmap scan via HexStrike-ai MCP
- Reasoning: "Need to identify all open ports and services to understand attack surface. HexStrike-ai MCP provides standardized interface."
- Tool Selected:
mcp_hexstrike-ai_nmap_scan - Execution: Automatic via MCP protocol
- Result: 14 ports discovered, domain identified
Decision 2: SMB Enumeration Approach
- Trigger: Network discovery complete, SMB port (445) identified
- AI Decision: Use Enum4linux via HexStrike-ai MCP for comprehensive SMB enumeration
- Reasoning: "Enum4linux provides detailed domain information. HexStrike-ai MCP ensures consistent execution and error handling."
- Tool Selected:
mcp_hexstrike-ai_enum4linux_scan - Troubleshooting: When access denied errors occurred, AI recognized as expected and continued
- Result: Domain information extracted successfully
Decision 3: Credential Discovery Strategy
- Trigger: Users discovered, need to find valid credentials
- AI Decision: Start with password spraying, then Kerberoasting, then AS-REP Roasting
- Reasoning: "Password spraying is safer (avoids lockouts). Kerberoasting targets service accounts. AS-REP Roasting targets accounts without pre-auth."
- Tool Selected: Direct Impacket execution (more reliable than MCP for these tools)
- Adaptation: When some tools failed, AI tried alternatives automatically
- Result: 3 valid credentials found, multiple hashes extracted
Decision 4: Exploitation Priority
- Trigger: Valid credentials obtained (Administrator:8dCT-DJjgScp)
- AI Decision: Perform DCSync attack immediately
- Reasoning: "DCSync provides complete domain credential database. Administrator credentials should have sufficient privileges."
- Tool Selected: Impacket secretsdump
- Error Handling: If DCSync failed, AI would try alternative methods
- Result: Complete domain dump successful, 27 hashes extracted
Robust Automated Troubleshooting
Example 1: Tool Not Found
Error: nxc: not found (NetExec not available)
AI Troubleshooting Process:
- Detected: Tool execution failed
- Analyzed: NetExec not installed on HexStrike server
- Adapted: Used alternative tool (CrackMapExec) or direct execution
- Continued: Proceeded with available tools
- Learned: Updated tool selection for future steps
Example 2: Authentication Failures
Error: NT_STATUS_LOGON_FAILURE with smbclient
AI Troubleshooting Process:
- Detected: SMB authentication failing
- Analyzed: Possible account lockout or wrong password format
- Tried Alternatives:
- Different authentication format
- Pass-the-Hash method
- CrackMapExec (better error handling)
4. Adapted: Switched to CrackMapExec which worked
5. Continued: Used working method for all subsequent tests
Example 3: LDAP Anonymous Bind Failed
Error: Anonymous LDAP enumeration failed
AI Troubleshooting Process:
- Detected: Anonymous access not allowed (expected)
- Analyzed: Need authenticated enumeration
- Adapted: Used discovered credentials for authenticated LDAP
- Continued: Performed comprehensive authenticated enumeration
- Result: Complete domain structure mapped
Key Feature: All troubleshooting was autonomous — Cursor AI handled every error without human intervention.
Results and Findings
Summary
- Users Discovered: 26
- Valid Credentials: 3
- Vulnerabilities: 3
- Exploits Executed: 3
Valid Credentials
Administrator:8dCT-DJjgScpTestUser:Password123!vagrant:vagrant
Vulnerabilities Identified
- Golden Ticket Attack Possible — krbtgt hash extracted via DCSync
- AS-REP Roasting — TestUser account vulnerable
- Kerberoasting — 4 service accounts with weak passwords
Exploits Executed
- DCSync Attack — Complete domain credential extraction
- Kerberoasting — Service account password extraction
- AS-REP Roasting — TestUser password extraction
Advantages of Cursor AI + HexStrike-ai MCP Automated Penetration Testing
Revolutionary Capabilities
- Single-Prompt Execution — Entire pentest from one human instruction
- Fully Autonomous Operation — Zero human intervention required
- Robust Automated Troubleshooting — Handles all errors automatically
- Intelligent Adaptation — Adapts to unexpected errors and situations in real-time
- Context-Aware Decision Making — Understands relationships between findings
- Self-Learning — Improves approach based on failures and successes
- Comprehensive Error Recovery — Multiple fallback strategies for each tool
- Scalability — Can assess multiple targets simultaneously
- Consistency — Follows methodology consistently without human error
- Automatic Documentation — Generates comprehensive reports and articles
Comparison: Manual vs. AI-Driven
Robust Troubleshooting Examples
Scenario 1: Multiple Tool Failures
When multiple tools failed (Hydra, Medusa SMB issues), Cursor AI:
- Detected pattern: SMB protocol compatibility issues
- Analyzed root cause: Outdated SMB implementations
- Found solution: Use CrackMapExec or smbclient
- Implemented fix: Switched to working tools
- Documented learning: Updated tool selection strategy
Scenario 2: Credential Discovery Challenges
When password spraying didn't find credentials immediately, Cursor AI:
- Tried multiple methods: Password spraying, AS-REP Roasting, Kerberoasting
- Used discovered credentials: TestUser:Password123! for authenticated attacks
- Escalated privileges: Used Administrator credentials for DCSync
- Achieved goal: Complete domain compromise
Scenario 3: Report Generation Issues
When report generation had path issues, Cursor AI:
- Detected error: File path problems
- Fixed paths: Corrected directory structure
- Regenerated reports: Created comprehensive documentation
- Verified output: Ensured all files created successfully
Conclusion
This automated black box assessment successfully demonstrated revolutionary AI-driven penetration testing capabilities using Cursor AI orchestrated with HexStrike-ai MCP tools. The entire assessment was initiated with a single human language prompt and executed completely autonomously, with Cursor AI:
- Discovering the target environment from scratch (starting with only an IP address)
- Identifying it as an Active Directory domain controller
- Enumerating all services, users, and domain structure
- Exploiting vulnerabilities systematically
- Making all strategic decisions autonomously
- Handling all errors robustly
- Generating comprehensive documentation
Key Black Box Achievement: Starting with zero knowledge of the target, Cursor AI successfully discovered and compromised a complete Active Directory environment.
Key Achievements
- ✅ Single-Prompt Execution — Entire pentest from one instruction
- ✅ Zero Human Intervention — Fully autonomous operation
- ✅ Robust Automated Troubleshooting — All errors handled automatically
- ✅ Complete domain enumeration — 26 users, all groups, complete structure
- ✅ Credential discovery and validation — 3 valid credentials found
- ✅ Advanced exploitation techniques — DCSync, Kerberoasting, AS-REP Roasting
- ✅ Complete domain compromise — 27 NTLM hashes, krbtgt hash extracted
- ✅ Comprehensive documentation — PT report and AI article generated automatically
- ✅ AI-driven decision making — All strategic decisions made autonomously
The Human Prompt That Started It All
"Do deep blackBox pentest on target 192.168.56.10. USE MCP Hexstrike. Do All needed troubleshooting"From this single instruction, Cursor AI:
- Discovered the target environment from scratch (black box)
- Identified it as an Active Directory domain controller
- Enumerated all services, users, and domain structure
- Exploited vulnerabilities systematically
- Created the entire automated framework
- Executed all phases autonomously
- Handled all errors and troubleshooting
- Adapted strategies based on discoveries
- Generated comprehensive reports
This represents a paradigm shift in penetration testing — from manual, time-intensive processes to fully automated, AI-driven black box assessments that can discover and exploit unknown environments, initiated with natural language and executed completely autonomously.
Future Implications
The combination of Cursor AI and HexStrike-ai MCP opens new possibilities:
- 24/7 Automated Security Testing — Continuous assessment capabilities
- Rapid Response — Immediate testing when new vulnerabilities discovered
- Scalability — Test multiple environments simultaneously
- Consistency — Eliminate human error and variation
- Accessibility — Non-experts can initiate comprehensive pentests
Andrey Pautov