Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/gosecure/ldap-scanner
Checks for signature requirements over LDAP
https://github.com/gosecure/ldap-scanner
hacktoberfest ldap ntlm-relay
Last synced: 8 days ago
JSON representation
Checks for signature requirements over LDAP
- Host: GitHub
- URL: https://github.com/gosecure/ldap-scanner
- Owner: GoSecure
- Created: 2020-01-09T20:49:56.000Z (almost 5 years ago)
- Default Branch: master
- Last Pushed: 2022-10-11T18:14:59.000Z (about 2 years ago)
- Last Synced: 2023-03-02T11:15:52.327Z (over 1 year ago)
- Topics: hacktoberfest, ldap, ntlm-relay
- Language: Python
- Homepage:
- Size: 3.91 KB
- Stars: 85
- Watchers: 2
- Forks: 7
- Open Issues: 1
-
Metadata Files:
- Readme: README.md
Awesome Lists containing this project
README
# ldap-scanner scanner
Checks for signature requirements over LDAP.
The script will establish a connection to the target host(s) and request
authentication without signature capability. If this is accepted, it means that the target hosts
allows unsigned LDAP sessions and NTLM relay attacks are possible to this LDAP service (whenever signing is not requested by the client).# Installation
```
$ pip install impacket
$ python3 ldap-scanner.py
```# Usage
```
[*] ldap scanner by @romcar / GoSecure - Based on impacket by SecureAuth
usage: ldap-scanner.py [-h] [-target-file file]
[-hashes LMHASH:NTHASH]
targetldap scanner - Connects over LDAP and attempts to authenticate with
invalid NTLM packets. If accepted, target is vulnerable to relay attackpositional arguments:
target [[domain/]username[:password]@]optional arguments:
-h, --help show this help message and exitconnection:
-target-file file Use the targets in the specified file instead of the
one on the command line (you must still specify
something as target name)authentication:
-hashes LMHASH:NTHASH
NTLM hashes, format is LMHASH:NTHASH
```