#ldap3

drmdrm
2024-09-05

Yet another toot about : I have created the pipy package ’ldap3-bleeding-edge’. This package is based on ldap3 2.10.1 (unreleased on pipy) + 6 pending PRs. It may be unstable but... "works on my machine" 🀷

sources: github.com/ThePirateWhoSmellsO

🌻

drmdrm
2024-03-21

Good news dear LDAP hackers πŸŽ‰ is now compatible with Channel Binding and LDAP Signing. You can use the library against hardened domain controllers. Thanks cannatag and CravateRouge.

Get the last version: github.com/cannatag/ldap3

More info: offsec.almond.consulting/ldap-

drmdrm
2023-11-28

The conclusion of my last post (offsec.almond.consulting/ldap-) is Β« Since a lot of ’s examples are based on , it seems easy to adapt them to work against hardened domain controllers Β». Good job Daniel!

Pull request on the impacket library that adds Channel binding support in the rbcd.py module.
clacke: exhausted pixie dream boy πŸ‡ΈπŸ‡ͺπŸ‡­πŸ‡°πŸ’™πŸ’›clacke@libranet.de
2023-11-02

The correct spelling of "DOMAIN\username" in LDAP search syntax is "DOMAIN\5cusername".

We're lucky one of our example users had valid hex in their username's first two characters and that the byte with this hex value had the high bit set so that it caused a UTF-8 decoding error, because Python package ldap3 "helpfully" treats \ as \ if the following two characters are invalid hex.

#ldap #ldap3

Nsukami _ | ε·£η₯žlemeteore
2019-04-15

Client Info

Server: https://mastodon.social
Version: 2025.04
Repository: https://github.com/cyevgeniy/lmst