đ¨LDAP
(TCP/UDP 389, TCP 636, 3268, 3269)
âšī¸ Introduction
Lightweight Directory Access Protocol (LDAP) is an internet protocol works on TCP/IP, used to access information from directories. LDAP protocol is basically used to access an active directory.
LDAP uses these ports:
LDAP TCP/UDP 389
LDAP SSL TCP 636
LDAP GC TCP 3268
LDAP GC SSL TCP 3269
Features of LDAP
Functional model of LDAP is simpler due to this it omits duplicate, rarely used and esoteric feature.
It is easier to understand and implement.
It uses strings to represent data
Directories
Directories are set of object with similar attributes, organised in a logical and hierarchical manner. For example, Telephonic Directories. It is a distributed database application used to manage attributes in a directory.
LDAP defines operations for accessing and modifying directory entries such as:
LDAP Models
ââLDAP can be explained by using four models upon which it based:
Information Model:
This model describes structure of information stored in an LDAP Directory.In this basic information is stored in directory is called an entity. Entries here represents object of interest in real world such as people, server, organization, etc. Entries contain collection of attributes that contain information about object.Every attribute has a type and one or more values. Here types of attribute is associated with syntax and syntax specifies what kind of values can be stored
Naming Model:
This model describes how information in an LDAP Directory is organized and identified. In this entries are organized in a Tree-Like structure called Directory Information Tree (DIT). Entries are arranged within DIT based on their distinguished name DN. DN is a unique name that unambiguously identifies a single entry.
Functional Model:
LDAP defines operations for accessing and modifying directory entries . In this we discuss about LDAP operations in a programming language independent manner LDAP operations can be divided into following categories:
âĸ Query
âĸ Update
âĸ Authentication
Security Model:
This model describes how information in LDAP directory can be protected from unauthorized access. It is based on BIND operation. There are several bind operation can be performed.
LDAP Enumeration
LDAP anonymous binding
enumeration with credentials
Finding all objects in the directory tree:
Extract users:
Extract computers:
Extract Domain Admins:
Extract Enterprise Admins:
Bypass TLS SNI check
Windows Server < 2003
just by accessing the LDAP server with an arbitrary domain name (like company.com) he was able to contact the LDAP service and extract information as an anonymous user:
crackmapexec
Last updated