LDAP Signing & Channel Binding Hardening
Tip
Jifunze na fanya mazoezi ya AWS Hacking:
HackTricks Training AWS Red Team Expert (ARTE)
Jifunze na fanya mazoezi ya GCP Hacking:HackTricks Training GCP Red Team Expert (GRTE)
Jifunze na fanya mazoezi ya Azure Hacking:
HackTricks Training Azure Red Team Expert (AzRTE)
Support HackTricks
- Angalia mpango wa usajili!
- Jiunge na π¬ kikundi cha Discord au kikundi cha telegram au tufuatilie kwenye Twitter π¦ @hacktricks_live.
- Shiriki mbinu za hacking kwa kuwasilisha PRs kwa HackTricks na HackTricks Cloud repos za github.
Kwa nini ni muhimu
LDAP relay/MITM inaruhusu wawashambuliaji kupeleka binds kwa Domain Controllers ili kupata authenticated contexts. Kuna udhibiti wawili upande wa server unaokatiza njia hizi:
- LDAP Channel Binding (CBT) inafunga LDAPS bind kwenye tunnel maalum ya TLS, ikivunja relays/replays kati ya chaneli tofauti.
- LDAP Signing inalazimisha ujumbe za LDAP zilizo na ulinzi wa integriti, ikizuia tampering na relays nyingi zisizosisitishwa.
Server 2025 DCs zinaleta GPO mpya (LDAP server signing requirements Enforcement) ambayo kwa default iko Require Signing pale inapobaki Not Configured. Ili kuepuka enforcement lazima uweke sera hiyo wazi kuwa Disabled.
LDAP Channel Binding (LDAPS only)
- Requirements:
- CVE-2017-8563 patch (2017) inaongeza Extended Protection for Authentication support.
- KB4520412 (Server 2019/2022) inaongeza telemetry ya LDAPS CBT βwhat-ifβ.
- GPO (DCs):
Domain controller: LDAP server channel binding token requirements Never(chaguo-msingi, hakuna CBT)When Supported(audit: hutoa failures, haizuizi)Always(enforce: inakataa LDAPS binds bila CBT halali)- Audit: weka When Supported ili kuonyesha:
- 3074 β LDAPS bind ingekuwa imefeli uthibitisho wa CBT ikiwa ingewekwa enforcement.
- 3075 β LDAPS bind iliacha data ya CBT na ingekataliwa ikiwa ingewekwa enforcement.
- (Event 3039 bado inaonyesha kushindwa kwa CBT kwenye builds za zamani.)
- Enforcement: weka Always mara LDAPS clients wanaporusha CBTs; inatumika tu kwa LDAPS (si raw 389).
LDAP Signing
- Client GPO:
Network security: LDAP client signing requirements=Require signing(vsNegotiate signingdefault on modern Windows). - DC GPO:
- Legacy:
Domain controller: LDAP server signing requirements=Require signing(default isNone). - Server 2025: acha sera ya legacy kuwa
Nonena wekaLDAP server signing requirements Enforcement=Enabled(Not Configured = enforced by default; wekaDisabledili kuepuka). - Compatibility: ni Windows XP SP3+ pekee zinazounga mkono LDAP signing; mifumo ya zamani itaathirika wakati enforcement itakapowashwa.
Audit-first rollout (recommended ~30 days)
- Washa diagnostics ya interface ya LDAP kwenye kila DC ili kurekodi binds zisizosainiwa (Event 2889):
Reg Add HKLM\SYSTEM\CurrentControlSet\Services\NTDS\Diagnostics /v "16 LDAP Interface Events" /t REG_DWORD /d 2
- Weka DC GPO
LDAP server channel binding token requirements= When Supported ili kuanza telemetri ya CBT. - Fuatilia matukio ya Directory Service:
- 2889 β unsigned/unsigned-allow binds (saini haina ulinganifu).
- 3074/3075 β LDAPS binds ambazo zingeanguka au kuacha CBT (inahitaji KB4520412 kwa 2019/2022 na hatua 2 hapo juu).
- Lazimisha kwa mabadiliko tofauti:
LDAP server channel binding token requirements= Always (DCs).LDAP client signing requirements= Require signing (clients).LDAP server signing requirements= Require signing (DCs) or (Server 2025)LDAP server signing requirements Enforcement= Enabled.
Marejeo
- TrustedSec - LDAP Channel Binding and LDAP Signing
- Microsoft KB4520412 - LDAP channel binding & signing requirements
- Microsoft CVE-2017-8563 - LDAP relay mitigation update
Tip
Jifunze na fanya mazoezi ya AWS Hacking:
HackTricks Training AWS Red Team Expert (ARTE)
Jifunze na fanya mazoezi ya GCP Hacking:HackTricks Training GCP Red Team Expert (GRTE)
Jifunze na fanya mazoezi ya Azure Hacking:
HackTricks Training Azure Red Team Expert (AzRTE)
Support HackTricks
- Angalia mpango wa usajili!
- Jiunge na π¬ kikundi cha Discord au kikundi cha telegram au tufuatilie kwenye Twitter π¦ @hacktricks_live.
- Shiriki mbinu za hacking kwa kuwasilisha PRs kwa HackTricks na HackTricks Cloud repos za github.


