TCP/UDP: LDAP - 389 / 636 / 3268
Scanning
Basic
Domain Name
nmap -n -sV --script "ldap* and not brute" <Target IP Address>Banner Grabbing
nmap -p 389 --script ldap-search -Pn <Target IP Address>LDAPSearch
Check if LDAP is accessible and accepting anonymous
ldapsearch -H ldap://<Target IP Address> -xSearch the base/root DSE
ldapsearch -x -H ldap://<Target IP Address> -s base namingcontextsEXAMPLE:
namingContexts: DC=corp, DC=local
Search entire subtree
ldapsearch -x -H ldap://<Target IP Address> -s sub -b "<Naming Contexts>"Enumerate all users
Enumerate all objects
Enumerate all username
Enumeration
Dump users, groups, OUs, computers, acls
Bruteforce
Last updated