You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
When I run Invoke-PKIAudit it runs the test against the CA and all of the templates. Does anyone know if it is possible to run the test specifically against one particular template? Some of our templates have a "/" character in the name which errors out the test. Trying to run this test against one particular template that doesn't have the "/" character. Thnx
The text was updated successfully, but these errors were encountered:
You could try removing the embedded version of PSPKI and latest version released by the author (there used to be some bugs in it bug he's made some fixes, see #17 ). We've been meaning to do this, but haven't had the cycles (PRs welcome!)
Alternative tools exist to check for privilege escalation vulns, including Certipy and Certify.
I updated PSPKIAudit to use the latest version os PSPKI, but it still has issues with special characters in the name. We do not plan to support scanning an individual template, so in the mean time we'll wait for a fix from PSPKI. Other open issues are tracking this problem right now
When I run Invoke-PKIAudit it runs the test against the CA and all of the templates. Does anyone know if it is possible to run the test specifically against one particular template? Some of our templates have a "/" character in the name which errors out the test. Trying to run this test against one particular template that doesn't have the "/" character. Thnx
The text was updated successfully, but these errors were encountered: