SkillAgentSearch skills...

Nullbinder

Tools to exploit misconfiguration into LDAP directory

Install / Use

/learn @gfrancqu/Nullbinder
About this skill

Quality Score

0/100

Supported Platforms

Universal

README

nullbinder

this tools allow you to exploit and extract informations from misconfigured LDAP directory that allow null bind and null based searches

installation

virtualenv venv
source venv/bin/activate
pip install python-ldap

usage

usage: nullbinder.py [-h] [--host HOST] [--port PORT] [--host-file HOST_FILE]
                     out

Test an LDAP server for null bind, base dn, and dump the content.

positional arguments:
  out                   output directory, will be created if doesn't exist

optional arguments:
  -h, --help            show this help message and exit
  --host HOST           host to scan (default: None)
  --port PORT           which port the ldap server is listenning on (default
                        to 389) (default: 389)
  --host-file HOST_FILE
                        provide a file containing list of host in the form
                        host:port (default: None)

Pull request are welcome !

Related Skills

View on GitHub
GitHub Stars4
CategoryDevelopment
Updated5y ago
Forks0

Languages

Python

Security Score

60/100

Audited on Feb 26, 2021

No findings