Ports:
- ldap 389/tcp
- ldaps 636/tcp
- globalldap/globalcatldap 3268/tcp
- globalldaps/globalcatldapssl 3269/tcp
Enumerate without credentials
Nmap enumeration scans
nmap -n -sV --script "ldap* and not brute" $target
Ldapsearch scan
ldapsearch -x -h $target -D '' -w '' -b "DC=BLA,DC=local"
Connect to LDAPs/GlobalLDAPs:
openssl s_client -connect $target:636 </dev/null openssl s_client -connect $target:3269 </dev/null
Search in the directory:
ldapsearch -x -b "DC=BLA,DC=LOCAL" -H ldap://$target:389 sAMAccountName=* ldapsearch -x -b "DC=BLA,DC=LOCAL" -H ldap://$target:3268 sAMAccountName=* ldapsearch -x -H ldap://$target:389 ldapsearch -x -H ldap://$target:3268
Enumerate with credentials
With LDAPDomainDump, the directory can be dumped.
Scripts
- LDAPDomainDump: Downloads many AD information, an existing user is required.
- Use DNStool to set records from a ActiveRecord DNS: python3 dnstool.py ‑u ‘intelligence\Tiffany.Molina’ ‑p NewIntelligenceCorpUser9876 10.10.10.248 ‑a add ‑r web1 ‑d 10.10.14.58 ‑t A
Leave a Reply
You must be logged in to post a comment.