📃
Internal Pentest
  • Internal pentest
    • Active Directory
      • Core Concepts
        • Domain Controllers
        • AD DS Data Store
        • AD DS Schema
        • Attributes
        • Containers and Leaves
        • Object Names and Identities
        • Directory Partitions/Naming Contexts
        • Oraganizational Units, Namespaces, domains, domain trees, forests and trust relationships
      • Reconnaissance
      • Initial attack vectors
        • LLMNR/NBT-NS Poisoning
          • Intercept and Hashcat
          • SMB relay
        • IPv6 Attacks
          • Basic attack
          • Combining NTLM Relaying and Kerberos delegation
          • Other attack vectors and strategies
        • ASREPRoast
        • ADCS + PetitPotal NTLM Relay
      • Post-Compromise Enumeration
        • Powerview
        • PingCastle
        • BloodHound
        • Other
      • Post-Compromise Attacks
        • Pass the Password
        • Pass the hash
        • Token impersonation
        • ASREPRoast
        • Kerberoasting
        • DCSync
        • DCShadow
        • GPP attacks
        • Golden tickets
        • PrintNightmare
        • Other Lateral movements and attacks
      • MISC
  • Cloud pentesting
    • Microsoft AZURE
      • Definitions and fundamentals
    • AWS
Powered by GitBook
On this page

Was this helpful?

  1. Internal pentest
  2. Active Directory
  3. Post-Compromise Enumeration

PingCastle

Ping Castle is a tool designed to assess quickly the Active Directory security level with a methodology based on risk assessment and a maturity framework. It's a simple zipped download that you can just run as a normal domain user, no install required.

You can run it on an ad-hoc basis to generate a detailed HTML report, but that's just the tip of the iceberg.

LogoDownload - PingCastlePingCastle

PreviousPowerviewNextBloodHound

Last updated 5 years ago

Was this helpful?