Free and open-source vulnerability scanner

Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.

Install Now

Available for macOS, Windows, and Linux

App screenshot

Nmap NSE net: ldap-search

Information

Severity

Severity

Informational

Family

Family

Nmap NSE net

CVSSv2 Base

CVSSv2 Base

0.0

CVSSv2 Vector

CVSSv2 Vector

AV:N/AC:L/Au:N/C:N/I:N/A:N

Created

Created

12 years ago

Modified

Modified

5 years ago

Summary

Attempts to perform an LDAP search and returns all matches. If no username and password is supplied to the script the Nmap registry is consulted. If the <code >ldap-brute' script has been selected and it found a valid account, this account will be used. If not anonymous bind will be used as a last attempt. SYNTAX: ldap.base: If set, the script will use it as a base for the search. By default the defaultNamingContext is retrieved and used. If no defaultNamingContext is available the script iterates over the available namingContexts ldap.username: If set, the script will attempt to perform an LDAP bind using the username and password ldap.password: If set, used together with the username to authenticate to the LDAP server ldap.qfilter: If set, specifies a quick filter. The library does not support parsing real LDAP filters. The following values are valid for the filter parameter: computer, users or all. If no value is specified it defaults to all. ldap.attrib: If set, the search will include only the attributes specified. For a single attribute a string value can be used, if multiple attributes need to be supplied a table should be used instead. ldap.maxobjects: If set, overrides the number of objects returned by the script (default 20). The value -1 removes the limit completely.