LDAP - 389
LDAP - 389
NMAP
ls /usr/share/nmap/scripts/ | grep LDAPScans
nmap -n -sV --script "ldap* and not brute"
ldapsearch -h <IP> -x -s base
ldapsearch -h <IP> -x -D '<DOMAIN>\<USER>' -w '<PASSWORD>' -b "DC=<1_SUBDOMAIN>,DC=<TDL>"3
Graphical Interface
jxplorerldapsearch
#use this without creds for anonymous binding
attemptldapsearch -h 10.10.10.33 -p 389 -x -s base -b " "(objectClass=*)" "*" + | moreGetAdUsers.py
Use this impacket python script to enumerate users and login/email details from a DC
LDAP Brute Patator
Last updated
Was this helpful?