Vulnerability   
Search   
    Search 219043 CVE descriptions
and 99761 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.104082
Category:Nmap NSE net
Title:Nmap NSE net: ldap-brute
Summary:Attempts to brute-force LDAP authentication. By default it uses the built-in username and password;lists. In order to use your own lists use the 'userdb' and 'passdb' script;arguments.;;This script does not make any attempt to prevent account lockout! If the number of passwords in the;dictionary exceed the amount of allowed tries, accounts will be locked out. This usually happens;very quickly.;;Authenticating against Active Directory using LDAP does not use the Windows user name but the user;accounts distinguished name. LDAP on Windows 2003 allows authentication using a simple user name;rather than using the fully distinguished name. E.g., 'Patrik Karlsson' vs. 'cn=Patrik;Karlsson, cn=Users, dc=cqure, dc=net' This type of authentication is not supported on e.g. OpenLDAP.;;This script uses some AD-specific support and optimizations: * LDAP on Windows 2003 reports;different error messages depending on whether an account exists or not. If the script receives an;error indicating that the username does not exist it simply stops guessing passwords for this;account and moves on to the next. * The script attempts to authenticate with the username only if no;LDAP base is specified. The benefit of authenticating this way is that the LDAP path of each account;does not need to be known in advance as it's looked up by the server.;;SYNTAX:;;ldap.base: If set, the script will use it as a base for the password;guessing attempts. If unset the user list must either contain the;distinguished name of each user or the server must support;authentication using a simple user name. See the AD discussion in the description.;;passdb: The filename of an alternate password database.;;userdb: The filename of an alternate username database.;;unpwdb.passlimit: The maximum number of passwords;'passwords' will return (default unlimited).;;unpwdb.userlimit: The maximum number of usernames;'usernames' will return (default unlimited).;;unpwdb.timelimit: The maximum amount of time that any iterator will run;before stopping. The value is in seconds by default and you can follow it;with 'ms', 's', 'm', or 'h' for;milliseconds, seconds, minutes, or hours. For example,;'unpwdb.timelimit=30m' or 'unpwdb.timelimit=.5h' for;30 minutes. The default depends on the timing template level (see the module;description). Use the value '0' to disable the time limit.
Description:Summary:
Attempts to brute-force LDAP authentication. By default it uses the built-in username and password
lists. In order to use your own lists use the 'userdb' and 'passdb' script
arguments.

This script does not make any attempt to prevent account lockout! If the number of passwords in the
dictionary exceed the amount of allowed tries, accounts will be locked out. This usually happens
very quickly.

Authenticating against Active Directory using LDAP does not use the Windows user name but the user
accounts distinguished name. LDAP on Windows 2003 allows authentication using a simple user name
rather than using the fully distinguished name. E.g., 'Patrik Karlsson' vs. 'cn=Patrik
Karlsson, cn=Users, dc=cqure, dc=net' This type of authentication is not supported on e.g. OpenLDAP.

This script uses some AD-specific support and optimizations: * LDAP on Windows 2003 reports
different error messages depending on whether an account exists or not. If the script receives an
error indicating that the username does not exist it simply stops guessing passwords for this
account and moves on to the next. * The script attempts to authenticate with the username only if no
LDAP base is specified. The benefit of authenticating this way is that the LDAP path of each account
does not need to be known in advance as it's looked up by the server.

SYNTAX:

ldap.base: If set, the script will use it as a base for the password
guessing attempts. If unset the user list must either contain the
distinguished name of each user or the server must support
authentication using a simple user name. See the AD discussion in the description.

passdb: The filename of an alternate password database.

userdb: The filename of an alternate username database.

unpwdb.passlimit: The maximum number of passwords
'passwords' will return (default unlimited).

unpwdb.userlimit: The maximum number of usernames
'usernames' will return (default unlimited).

unpwdb.timelimit: The maximum amount of time that any iterator will run
before stopping. The value is in seconds by default and you can follow it
with 'ms', 's', 'm', or 'h' for
milliseconds, seconds, minutes, or hours. For example,
'unpwdb.timelimit=30m' or 'unpwdb.timelimit=.5h' for
30 minutes. The default depends on the timing template level (see the module
description). Use the value '0' to disable the time limit.

CVSS Score:
7.5

CVSS Vector:
AV:N/AC:L/Au:N/C:P/I:P/A:P

CopyrightCopyright (C) 2011 NSE-Script: The Nmap Security Scanner; NASL-Wrapper: Greenbone Networks GmbH

This is only one of 99761 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2024 E-Soft Inc. All rights reserved.