Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | |||
Test ID: | 1.3.6.1.4.1.25623.1.0.104082 |
Category: | Nmap NSE net |
Title: | Nmap NSE net: ldap-brute |
Summary: | Attempts to brute-force LDAP authentication. By default it uses the built-in username and password;lists. In order to use your own lists use the 'userdb' and 'passdb' script;arguments.;;This script does not make any attempt to prevent account lockout! If the number of passwords in the;dictionary exceed the amount of allowed tries, accounts will be locked out. This usually happens;very quickly.;;Authenticating against Active Directory using LDAP does not use the Windows user name but the user;accounts distinguished name. LDAP on Windows 2003 allows authentication using a simple user name;rather than using the fully distinguished name. E.g., 'Patrik Karlsson' vs. 'cn=Patrik;Karlsson, cn=Users, dc=cqure, dc=net' This type of authentication is not supported on e.g. OpenLDAP.;;This script uses some AD-specific support and optimizations: * LDAP on Windows 2003 reports;different error messages depending on whether an account exists or not. If the script receives an;error indicating that the username does not exist it simply stops guessing passwords for this;account and moves on to the next. * The script attempts to authenticate with the username only if no;LDAP base is specified. The benefit of authenticating this way is that the LDAP path of each account;does not need to be known in advance as it's looked up by the server.;;SYNTAX:;;ldap.base: If set, the script will use it as a base for the password;guessing attempts. If unset the user list must either contain the;distinguished name of each user or the server must support;authentication using a simple user name. See the AD discussion in the description.;;passdb: The filename of an alternate password database.;;userdb: The filename of an alternate username database.;;unpwdb.passlimit: The maximum number of passwords;'passwords' will return (default unlimited).;;unpwdb.userlimit: The maximum number of usernames;'usernames' will return (default unlimited).;;unpwdb.timelimit: The maximum amount of time that any iterator will run;before stopping. The value is in seconds by default and you can follow it;with 'ms', 's', 'm', or 'h' for;milliseconds, seconds, minutes, or hours. For example,;'unpwdb.timelimit=30m' or 'unpwdb.timelimit=.5h' for;30 minutes. The default depends on the timing template level (see the module;description). Use the value '0' to disable the time limit. |
Description: | Summary: Attempts to brute-force LDAP authentication. By default it uses the built-in username and password lists. In order to use your own lists use the 'userdb' and 'passdb' script arguments. This script does not make any attempt to prevent account lockout! If the number of passwords in the dictionary exceed the amount of allowed tries, accounts will be locked out. This usually happens very quickly. Authenticating against Active Directory using LDAP does not use the Windows user name but the user accounts distinguished name. LDAP on Windows 2003 allows authentication using a simple user name rather than using the fully distinguished name. E.g., 'Patrik Karlsson' vs. 'cn=Patrik Karlsson, cn=Users, dc=cqure, dc=net' This type of authentication is not supported on e.g. OpenLDAP. This script uses some AD-specific support and optimizations: * LDAP on Windows 2003 reports different error messages depending on whether an account exists or not. If the script receives an error indicating that the username does not exist it simply stops guessing passwords for this account and moves on to the next. * The script attempts to authenticate with the username only if no LDAP base is specified. The benefit of authenticating this way is that the LDAP path of each account does not need to be known in advance as it's looked up by the server. SYNTAX: ldap.base: If set, the script will use it as a base for the password guessing attempts. If unset the user list must either contain the distinguished name of each user or the server must support authentication using a simple user name. See the AD discussion in the description. passdb: The filename of an alternate password database. userdb: The filename of an alternate username database. unpwdb.passlimit: The maximum number of passwords 'passwords' will return (default unlimited). unpwdb.userlimit: The maximum number of usernames 'usernames' will return (default unlimited). unpwdb.timelimit: The maximum amount of time that any iterator will run before stopping. The value is in seconds by default and you can follow it with 'ms', 's', 'm', or 'h' for milliseconds, seconds, minutes, or hours. For example, 'unpwdb.timelimit=30m' or 'unpwdb.timelimit=.5h' for 30 minutes. The default depends on the timing template level (see the module description). Use the value '0' to disable the time limit. CVSS Score: 7.5 CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P |
Copyright | Copyright (C) 2011 NSE-Script: The Nmap Security Scanner; NASL-Wrapper: Greenbone Networks GmbH |
This is only one of 99761 vulnerability tests in our test suite. Find out more about running a complete security audit. To run a free test of this vulnerability against your system, register below. |