02.03.2018 Views

Sybex CEH Certified Ethical Hacker Version 8 Study Guide

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

142 Chapter 6 ■ Enumeration of Services<br />

■<br />

■<br />

■<br />

■<br />

■<br />

Directory services that make use of LDAP include:<br />

Active Directory<br />

Novell eDirectory<br />

OpenLDAP<br />

Open Directory<br />

Oracle iPlanet<br />

In many cases the queries performed through LDAP against a database<br />

tend to disclose sensitive data that could be leveraged by an attacker.<br />

Many directory services offer ways to protect these queries through<br />

encryption or other mechanisms, which are either enabled by default or<br />

must be enabled by the administrator.<br />

Tools that allow for the enumeration of LDAP-enabled systems and services include the<br />

following:<br />

■ JXplorer<br />

■ LDAP Admin Tool<br />

■ LDAP Account Manager<br />

■ LEX (The LDAP Explorer)<br />

■ Active Directory Explorer<br />

■ LDAP Administration Tool<br />

■ LDAP Search<br />

■ Active Directory Domain Services Management Pack<br />

■ LDAP Browser/Editor<br />

Enumeration Using NTP<br />

Another effective way to gather information about a network and the resources on it is<br />

through use of the Network Time Protocol (NTP). Before you look at how to exploit this<br />

protocol for information-gathering purposes, you need to understand what the protocol<br />

does and what purpose it serves.<br />

NTP is a protocol used to synchronize the clocks across the hosts on a network. The<br />

importance of the protocol is extremely high considering that directory services rely on<br />

clock settings for logon purposes.<br />

NTP uses UDP port 123 for communication purposes.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!