TCP/UDP: LDAP - 389 / 636 / 3268

Scanning

Basic

Domain Name

nmap -n -sV --script "ldap* and not brute" <Target IP Address>

Banner Grabbing

nmap -p 389 --script ldap-search -Pn <Target IP Address>

LDAPSearch

Check if LDAP is accessible and accepting anonymous

ldapsearch -H ldap://<Target IP Address> -x

Search the base/root DSE

ldapsearch -x -H ldap://<Target IP Address> -s base namingcontexts

EXAMPLE:

namingContexts: DC=corp, DC=local

Search entire subtree

ldapsearch -x -H ldap://<Target IP Address> -s sub -b "<Naming Contexts>"

Enumerate all users

Enumerate all objects

Enumerate all username

Enumeration

Dump users, groups, OUs, computers, acls

Bruteforce

Last updated