Paper
Can LLMs Hack Enterprise Networks? -- Replicated Computational Results (RCR) Report
Authors
Andreas Happe, Jürgen Cito
Abstract
This is the Replicated Computational Results (RCR) Report for the paper ``Can LLMs Hack Enterprise Networks?" The paper empirically investigates the efficacy and effectiveness of different LLMs for penetration-testing enterprise networks, i.e., Microsoft Active Directory Assumed-Breach Simulations. This RCR report describes the artifacts used in the paper, how to create an evaluation setup, and highlights the analysis scripts provided within our prototype.
Metadata
Related papers
Vibe Coding XR: Accelerating AI + XR Prototyping with XR Blocks and Gemini
Ruofei Du, Benjamin Hersh, David Li, Nels Numan, Xun Qian, Yanhe Chen, Zhongy... • 2026-03-25
Comparing Developer and LLM Biases in Code Evaluation
Aditya Mittal, Ryan Shar, Zichu Wu, Shyam Agarwal, Tongshuang Wu, Chris Donah... • 2026-03-25
The Stochastic Gap: A Markovian Framework for Pre-Deployment Reliability and Oversight-Cost Auditing in Agentic Artificial Intelligence
Biplab Pal, Santanu Bhattacharya • 2026-03-25
Retrieval Improvements Do Not Guarantee Better Answers: A Study of RAG for AI Policy QA
Saahil Mathur, Ryan David Rittner, Vedant Ajit Thakur, Daniel Stuart Schiff, ... • 2026-03-25
MARCH: Multi-Agent Reinforced Self-Check for LLM Hallucination
Zhuo Li, Yupeng Zhang, Pengyu Cheng, Jiajun Song, Mengyu Zhou, Hao Li, Shujie... • 2026-03-25
Raw Data (Debug)
{
"raw_xml": "<entry>\n <id>http://arxiv.org/abs/2603.01789v1</id>\n <title>Can LLMs Hack Enterprise Networks? -- Replicated Computational Results (RCR) Report</title>\n <updated>2026-03-02T12:13:39Z</updated>\n <link href='https://arxiv.org/abs/2603.01789v1' rel='alternate' type='text/html'/>\n <link href='https://arxiv.org/pdf/2603.01789v1' rel='related' title='pdf' type='application/pdf'/>\n <summary>This is the Replicated Computational Results (RCR) Report for the paper ``Can LLMs Hack Enterprise Networks?\" The paper empirically investigates the efficacy and effectiveness of different LLMs for penetration-testing enterprise networks, i.e., Microsoft Active Directory Assumed-Breach Simulations. This RCR report describes the artifacts used in the paper, how to create an evaluation setup, and highlights the analysis scripts provided within our prototype.</summary>\n <category scheme='http://arxiv.org/schemas/atom' term='cs.CR'/>\n <published>2026-03-02T12:13:39Z</published>\n <arxiv:primary_category term='cs.CR'/>\n <author>\n <name>Andreas Happe</name>\n </author>\n <author>\n <name>Jürgen Cito</name>\n </author>\n <arxiv:doi>10.1145/3800584</arxiv:doi>\n <link href='https://doi.org/10.1145/3800584' rel='related' title='doi'/>\n </entry>"
}