LDAP injection
Understanding LDAP Injection
What is LDAP Injection?
Vulnerable Code Example
// PHP vulnerable LDAP authentication
$username = $_POST['username'];
$password = $_POST['password'];
$ldap_filter = "(&(uid=$username)(userPassword=$password))";
$result = ldap_search($ldap_conn, $base_dn, $ldap_filter);
if (ldap_count_entries($ldap_conn, $result) > 0) {
echo "Authentication successful";
} else {
echo "Authentication failed";
}How LDAP Injection Works
LDAP Query Structure
Impact and Consequences
LDAP Special Characters and Metacharacters
Filter Metacharacters
Distinguished Name (DN) Special Characters
Detection Methodology
Identifying Vulnerable Parameters
Common LDAP Integration Points
Vulnerable Function Patterns
Basic Detection Techniques
Authentication Bypass Testing
Boolean-Based Testing
Error-Based Detection
Advanced Detection Techniques
Blind LDAP Injection
Attribute Enumeration
Authentication Bypass Techniques
AND Logic Manipulation
Basic AND Bypass
Advanced AND Manipulation
OR Logic Exploitation
Basic OR Injection
Multi-User Bypass
Wildcard Exploitation
Universal Wildcards
Targeted Wildcard Attacks
Information Disclosure Techniques
User Enumeration
Username Discovery
Account Information Extraction
Group and Permission Discovery
Group Membership Enumeration
Permission Structure Discovery
Application-Specific LDAP Injection
Authentication Systems
Single Sign-On (SSO) Bypass
Multi-Factor Authentication
Web Application Integration
User Search Functionality
Profile Management
Enterprise Applications
Employee Directory Systems
Customer Relationship Management
Advanced LDAP Injection Techniques
Blind LDAP Injection Exploitation
Character-by-Character Extraction
Time-Based Extraction
Content-Length Analysis
Filter Injection Techniques
Complex Boolean Logic
Approximation Attacks
Range-Based Attacks
Protocol-Specific Techniques
LDAPS (LDAP over SSL/TLS)
LDAP Referrals
Extended Operations
Platform-Specific LDAP Injection
Active Directory Exploitation
Active Directory Specific Attributes
Group Policy and Permissions
Domain Trust Relationships
OpenLDAP Exploitation
OpenLDAP Schema Exploitation
OpenLDAP Overlays
389 Directory Server
389 DS Specific Features
Class of Service (CoS)
Web Application Framework Integration
PHP LDAP Integration
PHP-Specific Vulnerabilities
PHP Framework Integration
Java/Spring LDAP Integration
Spring LDAP Vulnerabilities
Java Enterprise Integration
.NET/ASP.NET LDAP Integration
.NET DirectoryServices Vulnerabilities
Node.js LDAP Integration
Node.js LDAP Libraries
Express.js LDAP Integration
Real-World Attack Scenarios
Enterprise SSO Bypass
Corporate Authentication System
Multi-Domain Environment
Customer Portal Exploitation
SaaS Application Attack
E-commerce Platform
Internal Directory Exploitation
HR System Attack
IT Asset Management
Advanced Evasion Techniques
Filter Encoding and Obfuscation
Character Encoding Methods
Alternative Representations
Complex Filter Construction
Nested Filter Evasion
Timing-Based Evasion
WAF and Filter Bypass
Common WAF Evasion
Length-Based Evasion
Last updated
Was this helpful?