LDAP

John, a professional hacker, targeted an organization that uses LDAP for accessing distributed directory services. He used an automated tool to anonymously query the LDAP service for sensitive information such as username, addresses, departmental details, and server names to launch further attacks on the target organization. What is tool employed by John to gather information from the LDAP services?

John, a professional hacker, targeted an organization that uses LDAP for accessing distributed directory services. He used an automated tool to anonymously query the LDAP service for sensitive information such as username, addresses, departmental details, and server names to launch further attacks on the target organization. What is tool employed by John to gather information from the LDAP services?

Option 1 : Zabasearch
Option 2 : EarthExplorer
Option 3 : Jxplorer
Option 4 : ike-scan
1. Zabasearch

ZabaSearch.com is a leading provider of public information about folks and their connections to others. ZabaSearch.com doesn’t give consumer reports and isn’t a consumer reporting agency as outlined by the tions to others. Intelius doesn’t give consumer reports and isn’t a shopper coverage agency as defined by the fair Credit reporting Act (FCRA). This website should not be used to confirm an individual’s eligibility for credit, insurance, employment, housing or the other purpose covered by the FCRA. Please visit GoodHire for all your employment screening wants.

2. EarthExplorer

Earth explorer data portal is your one stop buy getting geo-spatial datasets from our imagery collections. Users will navigate via interactive map or text search to get Landsat satellite imagery, Radar data, UAS data, digital line graphs, digital elevation model information, aerial photos, sentinel satellite data, some industrial satellite imagery together with IKONOS and OrbView3, land cover information, digital map information from the National Map, and many alternative datasets. Users will search by exact location via the interactive map or input specific coordinates to view what information types are available.

Objectives:

To obtain earth imagery across obtainable geo-spatial information types.

3. Jxplorer

JXplorer could be a cross platform LDAP browser and editor. it’s a standards compliant general purpose LDAP client which will be used to search, scan and edit any commonplace LDAP directory, or any directory service with an LDAP or DSML interface.

It is extremely flexible and can be extended and custom in a very number of the way. JXplorer is written in java, and also the source code and source code build system ar obtainable via svn or as a packaged build for users who wish to experiment or any develop the program.

JX is is available in 2 versions; the free open source version under an OSI Apache two style licence, or within the JXWorkBench Enterprise bundle with inbuilt reporting, administrative and security tools.

JX has been through a number of different versions since its creation in 1999; the foremost recent stable release is version 3.3.1, the August 2013 release.

JXplorer could be a absolutely useful LDAP consumer with advanced security integration and support for the harder and obscure elements of the LDAP protocol. it’s been tested on Windows, Solaris, linux and OSX, packages are obtainable for HPUX, AIX, BSD and it should run on any java supporting OS.

4. ike-scan

ike-scan could be a command-line IPSec VPN Scanner & Testing Tool for locating, procedure and testing IPsec VPN systems. It constructs and sends President of the United States Phase-1 packets to the desired hosts, and displays any responses that ar received.

IKE is the net Key Exchange protocol that is that the key exchange and authentication mechanism vast majority IPsec. almost all trendy VPN systems implement IPsec, and also the vast majority of IPsec VPNs use ike for key exchange. Main Mode is one among the modes outlined for phase-1 of the ike exchange (the other defined mode is aggressive mode). RFC 2409 section five specifies that main mode should be implemented, thus all ike implementations will be expected to support main mode. several also support Aggressive Mode.

What will ike-scan do?

ike-scan will perform the following functions:

  • Discovery confirm that hosts in a very given ip vary are running ike. this can be done by displaying those hosts that reply to the President of the United States requests sent./li>
  • Fingerprinting confirm that ike implementation the hosts are using, and in some cases confirm the version of software system that they’re running. this can be worn out 2 ways: first off by UDP backoff fingerprinting that involves recording the days of the ike response packets from the target hosts and comparison the determined retransmission backoff pattern against acknowledged patterns; and second by vendor ID procedure that compares merchandiser ID payloads from the VPN servers against acknowledged vendor id patterns.
  • Transform Enumeration notice that transform attributes are supported by the VPN server for ike Phase-1 (e.g. cryptography formula, hash formula etc.).
  • User Enumeration for a few VPN systems, discover valid VPN usernames.
  • Pre-Shared Key Cracking Perform offline lexicon or brute-force positive identification cracking for ike Aggressive Mode with Pre-Shared Key authentication. This uses the tool to get the hash and alternative parameters, and psk-crack (which is part of the package) to perform the cracking.
Learn CEH & Think like hacker


This Blog Article is posted by

Infosavvy, 2nd Floor, Sai Niketan, Chandavalkar Road Opp. Gora Gandhi Hotel, Above Jumbo King, beside Speakwell Institute, Borivali West, Mumbai, Maharashtra 400092

Contact us – www.info-savvy.com

https://g.co/kgs/ttqPpZ

Leave a Comment