PingCastle is a tool designed to assess quickly the Active Directory security level with a methodology based on risk assessment and a maturity framework. It does not aim at a perfect evaluation but rather as an efficiency compromise.
The risk level regarding Active Directory security has changed. Several vulnerabilities have been made popular with tools like mimikatz or sites likes adsecurity.org.
|:. PingCastle (Version 2.5.2.0)
| #:. Get Active Directory Security at 80% in 20% of the time
# @@ > End of support: 31/07/2020
| @@@:
: .# Vincent LE TOUX (contact@pingcastle.com)
.: https://www.pingcastle.com
Using interactive mode.
Do not forget that there are other command line switches like –help that you can use
What you would like to do?
1-healthcheck-Score the risk of a domain
2-graph -Analyze admin groups and delegations
3-conso -Aggregate multiple reports into a single one
4-nullsession-Perform a specific security check
5-carto -Build a map of all interconnected domains
6-scanner -Perform specific security checks on workstations
Also Read – Http Request Smuggler : Extension For Burp Suite
Build
PingCastle is a c# project which can be build from Visual Studio 2012 to Visual Studio 2017
For support requests, you should contact support@pingcastle.com The support for the basic edition is made on a best effort basis and fixes delivered when a new version is delivered.
The Basic Edition of PingCastle is released every 6 months (January, August) and this repository is updated at each release.
If you need changes, please contact contact@pingcastle.com for support packages.
PingCastle source code is licensed under a proprietary license and the Non-Profit Open Software License (“Non-Profit OSL”) 3.0.
Except if a license is purchased, you are not allowed to make any profit from this source code. To be more specific:
Ping Castle uses the following Open source components:
Credit: Vincent LE TOUX
bomber is an application that scans SBOMs for security vulnerabilities. So you've asked a vendor…
Embed a payload within a PNG file by splitting the payload across multiple IDAT sections.…
Exploit-Street, where we dive into the ever-evolving world of cybersecurity with a focus on Local…
Shadow Dumper is a powerful tool used to dump LSASS (Local Security Authority Subsystem Service)…
shadow-rs is a Windows kernel rootkit written in Rust, demonstrating advanced techniques for kernel manipulation…
Extract and execute a PE embedded within a PNG file using an LNK file. The…