LDAP
Last updated
Was this helpful?
Last updated
Was this helpful?
A lot of information on an AD domain can be obtained through LDAP. Most of the information can only be obtained with an authenticated bind but metadata (naming contexts, DNS server name, Domain Functional Level (DFL)) can be obtainable anonymously, even with anonymous binding disabled.
The (Python) tool can be used to enumerate essential information like delegations, gpo, groups, machines, pso, trusts, users, and so on.
(Python) also has useful modules that can be used to
map information regarding
show subnets listed in AD-SS (Active Directory Sites and Services)
list the users description
print the domain-level attribute's value
The PowerShell equivalent to netexec's subnets
modules is the following
Automation and scripting
is an Active Directory information dumper via LDAP, outputting information in human-readable HTML files.
With 's (Python), it is possible to gather lots of information regarding the domain users and groups, the computers, , etc. through a within an LDAP session.
LDAP anonymous binding is usually disabled but it's worth checking. It could be handy to list the users and test for (since this attack needs no authentication).
A more advanced LDAP enumeration can be carried out with BloodHound (see ).
The enum4linux tool can also be used, among other things, for LDAP recon (see ).