Rogue LDAP Server
Omit initial configuration?:
No
DNS domain name:
target domain
Organization name:
target domain
Administrator password:
anything, but remember it
Database removed?:
No
Move old database?:
Yes
Before using the rogue LDAP server, we need to make it vulnerable by downgrading the supported authentication mechanisms. We want to ensure that our LDAP server only supports PLAIN and LOGIN authentication methods. To do this, we need to create a new ldif file, called with the following content:
olcSaslSecProps: Specifies the SASL security properties
noanonymous: Disables mechanisms that support anonymous login
minssf: Specifies the minimum acceptable security strength with 0, meaning no protection.
Update configuration
Verify configuration
We have our LDAP server running under the 389 port.
Capturing LDAP Credentials
And we are able to retrieve the plain text password used for the Printer Service against LDAP.
Last updated