Penetration Testing mailing list archives

RE: LDAP directory


From: "Sacha Faust" <sacha () smugline net>
Date: Mon, 6 Aug 2001 19:14:07 -0400

finding LDAP users can change depending on what you consider a user.
You need to identify what objectclass and attributes are used in the user
definition.

Netscape Directory Server( iPlanet Directory ) use
objectClass: person

to define a user object by default. Things to scan for to find users is
email, name, uid, person, ....
Just try to understand what the Directory is for and then search for
relevant information.

It's often very easy to find search base for users when you query the LDAP
root dse for information and then looking
for the "namingcontexts" attribute.


Here is a quick snip of how to get the searchbase our of the root dse
information :

<--- START SNIP

int get_namingcontext( LDAP *ld ){

        LDAPMessage *ldmsg;
        LDAPMessage *msg_tmp;
        BerElement *ber;
        int proto_ver;
        int i;
        char *szattr;
        char **szvalues;
        char *attr[2];
        int GOOD = TRUE;

        attr[0] = "namingcontexts";             // all we want is the namingcontext
        attr[1] = NULL;

        // forcing ldap protocol version 3
        proto_ver = LDAP_VERSION3;
        if( ldap_set_option(ld, LDAP_OPT_PROTOCOL_VERSION, &proto_ver) !=
LDAP_SUCCESS ){
                ldap_perror(ld, "ldap_set_option : ldap version");
                return FALSE;
        }

        if( ldap_set_option(ld, LDAP_OPT_REFERRALS, LDAP_OPT_OFF) !=
LDAP_SUCCESS ){
                ldap_perror(ld, "ldap_set_option : referrals option");
                return FALSE;
        }

        if( ldap_search_s(ld, "", LDAP_SCOPE_BASE, "(objectclass=*)", attr, 0,
&ldmsg) != LDAP_SUCCESS ){
                ldap_perror(ld, "ldap_search_s");
                return FALSE;
        }

        // now process the information in ldmsg
        // ....
<------- END SNIP


Another thing to consider is the security of the implementation. I've only
had the change to check security of Netscape Directory server and I was
quite shock at the file ACL ( specially on NT systems ). There is many ways
of elevating privilege if a user get any kind of access to the LDAP Server
file system
( Check attachement
http://www.smugline.net/zorky/ldap/netscape4.12-nt-tree.txt and
http://www.smugline.net/zorky/ldap/netscape4.12-linux-tree.txt for full ACL
listing ). Having everyone RW access to all the most of the files under NT
is very dangerous. A user can replace a binary and when the server admin
runs it you can take control over the system.

Another nice thing in Netscape Directory server is it's ability to run Perl
code when nsexecref attribute is specified
Example :

dn: cn=UpdateGateway, cn=Operation, cn=Tasks, cn=slapd-ldap, cn=Netscape
Directory Server, cn=Server Group, cn=ldap.msp.com, ou=msp.com,
o=netscaperoot
nsexecref: perl?updatedsgw      <---- actually
C:\Netscape\Server4\bin\slapd\admin\bin\updatedsgw
objectclass: top
objectclass: nstask
objectclass: nsAdminObject
cn: UpdateGateway

You can have alot of fun with this once you gain a decent access to the
service.


Anyone as more information on the subject. I did all of this a while ago.

-----Original Message-----
From: Andrey Gordienko [mailto:red () rsh kiev ua]
Sent: Friday, August 03, 2001 10:56 AM
To: sacha () smugline net
Subject:


Hello sacha,

  I use your ldapminer I know have send request for get info of server
  (your firts request) but I dont know request for get users
  please if you can tell me format of request for get users

--
Best regards,
  Do you need in security ?
  download now ShadowSecurityScanner and
  ShadowEnterpriseWebFirewall from
  http://www.rsh.kiev.ua/

 Andrey                          mailto:red () rsh kiev ua
                                    http://www.rsh.kiev.ua
                                    ICQ   53652588




----------------------------------------------------------------------------
This list is provided by the SecurityFocus Security Intelligence Alert (SIA)
Service. For more information on SecurityFocus' SIA service which
automatically alerts you to the latest security vulnerabilities please see:
https://alerts.securityfocus.com/


Current thread: