LDAP Nom Nom
Anonymously bruteforce Active Directory usernames from Domain Controllers by abusing LDAP Ping requests (cLDAP)
No Windows audit logs generated. High speed ~ up to 10K usernames tested per second.
- Tries to autodetect DC from environment variables on domain joined machines or falls back to machine hostname FDQN DNS suffix
- Reads usernames to test from stdin (default) or file
- Outputs to stdout (default) or file
- Parallelized (defaults to 8 connections)
- Shows progressbar if you’re using both input and output files
Username lists
Installation
go install github.com/lkarlslund/ldapnomnom@latest
Usage
ldapnomnom [--server ipaddress] [--port number] [--tlsmode notls|tls|starttls] [--input filename] [--output filename [--progressbar]] [--parallel number-of-connections]
Flags
-dnsdomain string
Domain to connect to in DNS suffix format - will try autodection if not supplied
-ignorecert
Disable certificate checks (default true)
-input string
File to read usernames from, uses stdin if not supplied
-output string
File to write detected usernames to, uses stdout if not supplied
-parallel int
How many connections to run in parallel (default 8)
-port int
LDAP port to connect to (389 or 636 typical) (default 389)
-server string
DC to connect to, use IP or full hostname - will try autodection if not supplied
-tlsmode string
Transport mode (TLS, StartTLS, NoTLS) (default "NoTLS")
Examples
ldapnomnom --input 10m_usernames.txt --output results.txt --server 192.168.0.11 --parallel 16