LDAP Relaying
Last updated
Last updated
LDAP Relaying attacks can make use of NTLM authentication. Similar to , an attacker who captures credentials via or Responder can then relay them to a domain controller, targeting LDAP.
It should be noted that the following two defaults need to be set in order for this to be exploited:
can be utilized to identify whether LDAP Signing and/or LDAP Channel Binding are enabled or not.
Create a new domain computer by abusing the default attribute ms-DS-MachineAccountQuota
which is by default set to 10, allowing all authenticated users to add up to 10 computers to the domain.
This account can then be utilized to perform authenticated attacks against the domain such as Kerberoasting.