May 2017
Intermediate to advanced
416 pages
21h 33m
English
Penetration testers often need to locate the domain controllers on networks as they are the most important systems that, if vulnerable, will give access to any machine that is part of the AD. There are different ways of identifying domain controllers from a machine that is not part of the domain. One method is locating the LDAP service. It usually runs on TCP port 389 and the Nmap Scripting Engine has version detection signatures that can help us identify the service correctly.
In the Nmap nmap -p389 -sV command, we probed TCP port 389 and enabled the version detection engine to identify the LDAP service:
PORT STATE SERVICE VERSION 389/tcp open ldap Microsoft Windows AD LDAP (Domain:TESTDOMAIN, Site: TEST)
Read now
Unlock full access