PingCastle : Get Active Directory Security At 80% In 20% Of The Time

PingCastle is a tool designed to assess quickly the Active Directory security level with a methodology based on risk assessment and a maturity framework. It does not aim at a perfect evaluation but rather as an efficiency compromise.

The risk level regarding Active Directory security has changed. Several vulnerabilities have been made popular with tools like mimikatz or sites likes adsecurity.org.

|:. PingCastle (Version 2.5.2.0)
| #:. Get Active Directory Security at 80% in 20% of the time
# @@ > End of support: 31/07/2020
| @@@:
: .# Vincent LE TOUX (contact@pingcastle.com)
.: https://www.pingcastle.com
Using interactive mode.
Do not forget that there are other command line switches like –help that you can use
What you would like to do?
1-healthcheck-Score the risk of a domain
2-graph -Analyze admin groups and delegations
3-conso -Aggregate multiple reports into a single one
4-nullsession-Perform a specific security check
5-carto -Build a map of all interconnected domains
6-scanner -Perform specific security checks on workstations

Also Read – Http Request Smuggler : Extension For Burp Suite

Build

PingCastle is a c# project which can be build from Visual Studio 2012 to Visual Studio 2017

Support & lifecycle

For support requests, you should contact support@pingcastle.com The support for the basic edition is made on a best effort basis and fixes delivered when a new version is delivered.

The Basic Edition of PingCastle is released every 6 months (January, August) and this repository is updated at each release.

If you need changes, please contact contact@pingcastle.com for support packages.

License

PingCastle source code is licensed under a proprietary license and the Non-Profit Open Software License (“Non-Profit OSL”) 3.0.

Except if a license is purchased, you are not allowed to make any profit from this source code. To be more specific:

  • It is allowed to run PingCastle without purchasing any license on for profit companies if the company itself (or its ITSM provider) run it.
  • To build services based on PingCastle AND earning money from that, you MUST purchase a license.

Ping Castle uses the following Open source components:

Credit: Vincent LE TOUX

R K

Recent Posts

Bomber : Navigating Security Vulnerabilities In SBOMs

bomber is an application that scans SBOMs for security vulnerabilities. So you've asked a vendor…

24 hours ago

EmbedPayloadInPng : A Guide To Embedding And Extracting Encrypted Payloads In PNG Files

Embed a payload within a PNG file by splitting the payload across multiple IDAT sections.…

24 hours ago

Exploit Street – Navigating The New Terrain Of Windows LPEs

Exploit-Street, where we dive into the ever-evolving world of cybersecurity with a focus on Local…

3 days ago

ShadowDumper – Advanced Techniques For LSASS Memory Extraction

Shadow Dumper is a powerful tool used to dump LSASS (Local Security Authority Subsystem Service)…

4 days ago

Shadow-rs : Harnessing Rust’s Power For Kernel-Level Security Research

shadow-rs is a Windows kernel rootkit written in Rust, demonstrating advanced techniques for kernel manipulation…

2 weeks ago

ExecutePeFromPngViaLNK – Advanced Execution Of Embedded PE Files via PNG And LNK

Extract and execute a PE embedded within a PNG file using an LNK file. The…

3 weeks ago