LDAP
LDAP Enumeration and Exploitation
ldapsearch
Get domain infomation (anonymous bind)
ldapsearch -H ldap://192.168.1.123 -x -s base namingcontextsQuery with credentials
ldapsearch -x -H 192.168.12.134 -D 'DOMAIN\user' -w 'password' -b "DC=target,DC=htb"Username Enumeration
ldapsearch -H ldap://192.168.1.123 -x -b "DC=target,DC=htb" "(objectClass=person)" | \
grep "sAMAccountName:"ldapdump
ldapdomaindump -u 'support\ldap' -p 'p@ssw0rd' dc.support.htb
# Parse Computer Lists
cat domain_computers.json | jq -r .[].attributes.dNSHostName[]
# Parse Domain Users
cat domain_users.json | jq -r .[].attributes.sAMAccountName[]windapsearch
Last updated
Was this helpful?