Skip to main content
Glama

certipy_scan

Scan Active Directory Certificate Services to identify AD CS vulnerabilities for security assessment and penetration testing.

Instructions

Call this to enumerating Active Directory Certificate Services (AD CS) vulnerabilities. username syntax is: username@domain

Input Schema

TableJSON Schema
NameRequiredDescriptionDefault
ipYes
usernameYes
passwordYes
ntlmNo
kerberosNo

Implementation Reference

  • The handler function for the 'certipy_scan' tool. It is registered via the @mcp.tool decorator and executes the 'certipy find' command with options based on authentication method (NTLM or Kerberos) to scan for Active Directory Certificate Services vulnerabilities.
    @mcp.tool(name="certipy_scan",description="Call this to enumerating Active Directory Certificate Services (AD CS) vulnerabilities. username syntax is: username@domain") def certipy_scan(ip:str,username:str,password:str,ntlm:bool=False,kerberos:bool=False): if ntlm: return run_command(["certipy","find","-vulnerable","-u", user ,"-hashes",password,"-dc-ip",ip,"-stdout"]) if kerberos: return run_command(["certipy","find","-vulnerable","-u", user ,"-k","-p",password,"-dc-ip",ip,"-stdout"]) return run_command(["certipy","find","-vulnerable","-u", user ,"-p",password,"-dc-ip",ip,"-stdout"])

Latest Blog Posts

MCP directory API

We provide all the information about MCP servers via our MCP API.

curl -X GET 'https://glama.ai/api/mcp/v1/servers/YoussefSahnoun/PentestMCP'

If you have feedback or need assistance with the MCP directory API, please join our Discord server