Ldap Enumeration
nxc ldap 192.168.235.122 -u 'fmcsorley' -p 'CrabSharkJellyfish192' --query "(objectClass=*)" "*"nxc ldap 192.168.235.122 -u '' -p '' --query "(sAMAccountName=*)" "*"nxc ldap <ip> -u username -p password --query "(sAMAccountName=Administrator)" ""Change the name here
nxc ldap <ip> -u username -p password --query "(sAMAccountName=Administrator)" "sAMAccountName objectClass pwdLastSet"To get descriptions for users:
nxc ldap 192.168.235.122 -u '' -p '' -M get-desc-usersldapnomnom --input 10m_usernames.txt --output multiservers.txt --dnsdomain contoso.local --maxservers 32 --parallel 16ldapnomnom --input 10m_usernames.txt --output results.txt --server 192.168.0.11 --parallel 4Extract rootDSE attributes:
ldapnomnom --output rootDSEs.json --dumpnmap -sV --script "ldap* and not brute" <IP>` ldapsearch -x -H ldap://192.168.218.122 -s base namingcontextsGet everything to grep for:
ldapsearch -x -H ldap://192.168.192.122 -D '' -w '' -b "DC=hutch,DC=offsec" > ldap-searchldapsearch -H ldap://<ip> -x -b "DC=INLANEFREIGHT,DC=LOCAL" -s sub "(&(objectclass=user))"Analysing:
cat ldap.txt | awl '{print $1}' | sort | uniq -c| sort -n | grep ':'Print first word then sort then print unique and then show non repeating.grep ':' removes the base64 stuff.
ldapsearch -H ldap://<ip> -x -b "DC=absolute,DC=htb" -s sub "(&(objectclass=user))" | grep sAMAccountName: | cut -f2 -d" "Optionally use authentication with -U and -w for username and password
ldapsearch -x -H ldap://192.168.192.122 -D '' -w '' -b "DC=hutch,DC=offsec"Last updated
Was this helpful?