PingCastle : Get Active Directory Security At 80% In 20% Of The Time

PingCastle is a tool designed to assess quickly the Active Directory security level with a methodology based on risk assessment and a maturity framework. It does not aim at a perfect evaluation but rather as an efficiency compromise.

The risk level regarding Active Directory security has changed. Several vulnerabilities have been made popular with tools like mimikatz or sites likes adsecurity.org.

|:. PingCastle (Version 2.5.2.0)
| #:. Get Active Directory Security at 80% in 20% of the time
# @@ > End of support: 31/07/2020
| @@@:
: .# Vincent LE TOUX (contact@pingcastle.com)
.: https://www.pingcastle.com
Using interactive mode.
Do not forget that there are other command line switches like –help that you can use
What you would like to do?
1-healthcheck-Score the risk of a domain
2-graph -Analyze admin groups and delegations
3-conso -Aggregate multiple reports into a single one
4-nullsession-Perform a specific security check
5-carto -Build a map of all interconnected domains
6-scanner -Perform specific security checks on workstations

Also Read – Http Request Smuggler : Extension For Burp Suite

Build

PingCastle is a c# project which can be build from Visual Studio 2012 to Visual Studio 2017

Support & lifecycle

For support requests, you should contact support@pingcastle.com The support for the basic edition is made on a best effort basis and fixes delivered when a new version is delivered.

The Basic Edition of PingCastle is released every 6 months (January, August) and this repository is updated at each release.

If you need changes, please contact contact@pingcastle.com for support packages.

License

PingCastle source code is licensed under a proprietary license and the Non-Profit Open Software License (“Non-Profit OSL”) 3.0.

Except if a license is purchased, you are not allowed to make any profit from this source code. To be more specific:

  • It is allowed to run PingCastle without purchasing any license on for profit companies if the company itself (or its ITSM provider) run it.
  • To build services based on PingCastle AND earning money from that, you MUST purchase a license.

Ping Castle uses the following Open source components:

Credit: Vincent LE TOUX

R K

Recent Posts

How to Prevent Software Supply Chain Attacks

What is a Software Supply Chain Attack? A software supply chain attack occurs when a…

13 minutes ago

How UDP Works and Why It Is So Fast

When people ask how UDP works, the simplest answer is this: UDP sends data quickly…

1 week ago

How EDR Killers Bypass Security Tools

Endpoint Detection and Response (EDR) solutions have become a cornerstone of modern cybersecurity, designed to…

2 weeks ago

AI-Generated Malware Campaign Scales Threats Through Vibe Coding Techniques

A large-scale malware campaign leveraging AI-assisted development techniques has been uncovered, revealing how attackers are…

2 weeks ago

How Does a Firewall Work Step by Step

How Does a Firewall Work Step by Step? What Is a Firewall and How Does…

2 weeks ago

Fake VPN Download Trap Can Steal Your Work Login in Minutes

People trying to securely connect to work are being tricked into doing the exact opposite.…

2 weeks ago