Msldap is a tool for (LDAP) LightWeight Directory Acess Protocol library for MS AD.
Features
Installation
Via GIT
python3 setup.py install
OR
pip install msldap
Prerequisites
winsspi
module. For windows only. This supports SSPI based authentication.asn1crypto
module. Some LDAP queries incorporate ASN1 strucutres to be sent on top of the ASN1 transport XDasysocks
module. To support socks proxying.aiocmd
For the interactive clientasciitree
For plotting nice trees in the interactive clientUsage
Please note that this is a library, and was not intended to be used as a command line program.
Whit this noted, the projects packs a fully functional LDAP interactive client. When installing the msldap
module with setup.py install
a new binary will appear called msldap
(shocking naming conventions)
LDAP Connection URL
he major change was needed in version 0.2.0 to unify different connection options as one single string, without the need for additional command line switches.
The new connection string is composed in the following manner:<protocol>+<auth_method>://<domain>\<username>:<password>@<ip>:<port>/?<param>=<value>&<param>=<value>&...
Detailed explanation with examples:
+://:@://?=
sets the ldap protocol following values supported:
– ldap
– ldaps
can be omitted if plaintext authentication is to be performed (in that case it default to ntlm-password), otherwise:
– ntlm-password
– ntlm-nt
– kerberos-password (dc option param must be used)
– kerberos-rc4 / kerberos-nt (dc option param must be used)
– kerberos-aes (dc option param must be used)
– kerberos-keytab (dc option param must be used)
– kerberos-ccache (dc option param must be used)
– sspi-ntlm (windows only!)
– sspi-kerberos (windows only!)
– anonymous
– plain
– simple
– sicily (same format as ntlm-nt but using the SICILY authentication)
:
OPTIONAL. Specifies the root tree of all queries
can be:
– timeout : connction timeout in seconds
– proxytype: currently only socks5 proxy is supported
– proxyhost: Ip or hostname of the proxy server
– proxyport: port of the proxy server
– proxytimeout: timeout ins ecodns for the proxy connection
– dc: the IP address of the domain controller, MUST be used for kerberos authentication
Examples:
ldap://10.10.10.2 (anonymous bind)
ldaps://test.corp (anonymous bind)
ldap+sspi-ntlm://test.corp
ldap+sspi-kerberos://test.corp
ldap://TEST\victim:@10.10.10.2 (defaults to SASL GSSAPI NTLM)
ldap+simple://TEST\victim:@10.10.10.2 (SASL SIMPLE auth)
ldap+plain://TEST\victim:@10.10.10.2 (SASL SIMPLE auth)
ldap+ntlm-password://TEST\victim:@10.10.10.2
ldap+ntlm-nt://TEST\victim:@10.10.10.2
ldap+kerberos-password://TEST\victim:@10.10.10.2
ldap+kerberos-rc4://TEST\victim:@10.10.10.2
ldap+kerberos-aes://TEST\victim:@10.10.10.2
ldap://TEST\victim:password@10.10.10.2/DC=test,DC=corp/
ldap://TEST\victim:password@10.10.10.2/DC=test,DC=corp/?timeout=99&proxytype=socks5&proxyhost=127.0.0.1&proxyport=1080&proxytimeout=44
Playwright-MCP (Model Context Protocol) is a cutting-edge tool designed to bridge the gap between AI…
JBDev is a specialized development tool designed to streamline the creation and debugging of jailbreak…
The Kereva LLM Code Scanner is an innovative static analysis tool tailored for Python applications…
Nuclei-Templates-Labs is a dynamic and comprehensive repository designed for security researchers, learners, and organizations to…
SSH-Stealer and RunAs-Stealer are malicious tools designed to stealthily harvest SSH credentials, enabling attackers to…
Control flow flattening is a common obfuscation technique used by OLLVM (Obfuscator-LLVM) to transform executable…