Skip to content

Anonymously bruteforce Active Directory usernames from Domain Controllers by abusing LDAP Ping requests (cLDAP)

License

Notifications You must be signed in to change notification settings

rodriguezjorgex/ldapnomnom

 
 

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

12 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

LDAP Nom Nom

Anonymously bruteforce Active Directory usernames from Domain Controllers by abusing LDAP Ping requests (cLDAP)

No Windows audit logs generated. High speed ~ up to 10K usernames tested per second.

GitHub all releases GitHub Workflow Status

  • Tries to autodetect DC from environment variables on domain joined machines or falls back to machine hostname FDQN DNS suffix
  • Reads usernames to test from stdin (default) or file
  • Outputs to stdout (default) or file
  • Parallelized (defaults to 8 connections)
  • Shows progressbar if you're using both input and output files

Download auto built binaries from releases or build and install with this Go command:

go install github.com/lkarlslund/ldapnomnom@latest

Usage

ldapnomnom [--server ipaddress] [--port number] [--tlsmode notls|tls|starttls] [--input filename] [--output filename [--progressbar]] [--parallel number-of-connections]

Example

ldapnomnom --input 10m_usernames.txt --output results.txt --server 192.168.0.11 --parallel 16

Look for username lists to feed into this elsewhere - for instance the 10M list from here

Detection

  • No Windows event logs are generated (tested on Windows 2016 / 2019)
  • Requires custom network level monitoring (unencrypted LDAP analysis or traffic volume for LDAPS)

Mitigation

  • None, this is part of the dcLocator stuff
  • Rename your administrator account
  • Audit accounts for having same password as the username
  • Prevent kerberoasting by removing SPNs on as many accounts as possible
  • Use long and complex passwords on accounts with SPNs

History

During a discussion on Twitter about locating Kerberos services, someone hinted the existance of LDAP Ping requests. They're documented on Microsofts Open Specifications Pages, and it contains pseudo code for how you initiate a LDAP Ping, what parameters it takes and the data returned. It immediately seemed obvious that there is an information leak here that can be abused.

After having released the tool, I can see I'm not the only one to spot this "mistake" which is clearly still around for historic backwards compatibility reasons.

If you want to avoid network level detection as an attacker you should use TLS on port 636 (tool defaults to unencrypted LDAP on port 389).

If you like Active Directory you might also like my attack graph tool Adalanche

About

Anonymously bruteforce Active Directory usernames from Domain Controllers by abusing LDAP Ping requests (cLDAP)

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages

  • Go 88.5%
  • PowerShell 11.5%