LDAP Pass-back
Last updated
Last updated
With the IP in the same segment of the DC and Printer server, we can play with the interface to forgery a request using our port 389 (LDAP):
Listen with netcat trying to intercept the LDAP connection and retrieve the plain text of the password:
We receive the connection, but no leak of credentials.
So, let's one step forward and create a Rogue LDAP Server.