All posts

Nmap LDAP Enumeration: Quick Scans for Critical Data

Nmap can expose LDAP in seconds. Lightweight Directory Access Protocol runs on port 389 by default. It holds authentication, authorization, and directory data — the keys to the kingdom. Whether you’re auditing infrastructure or probing a new network, Nmap’s precision with LDAP scanning makes it essential. Run a simple command to start: nmap -p 389 --script ldap-rootdse <target> This checks the RootDSE entry, revealing vendor, version, and supported capabilities without logging in. For deeper

Free White Paper

LDAP Directory Services: The Complete Guide

Architecture patterns, implementation strategies, and security best practices. Delivered to your inbox.

Free. No spam. Unsubscribe anytime.

Nmap can expose LDAP in seconds. Lightweight Directory Access Protocol runs on port 389 by default. It holds authentication, authorization, and directory data — the keys to the kingdom. Whether you’re auditing infrastructure or probing a new network, Nmap’s precision with LDAP scanning makes it essential.

Run a simple command to start:

nmap -p 389 --script ldap-rootdse <target>

This checks the RootDSE entry, revealing vendor, version, and supported capabilities without logging in. For deeper analysis, Nmap’s ldap-search script can pull user, group, and schema entries. Use flags wisely. Limit queries to avoid triggering alerts or lockouts on production systems.

Common Nmap LDAP scripts:

Continue reading? Get the full guide.

LDAP Directory Services: Architecture Patterns & Best Practices

Free. No spam. Unsubscribe anytime.
  • ldap-search — dumps directory data.
  • ldap-brute — tests authentication with a username list.
  • ldap-novell-getpass — retrieves Novell eDirectory passwords when misconfigured.

Combine LDAP scanning with Nmap’s timing and host discovery options to map large networks quickly:

nmap -p 389 -T4 -Pn --script ldap-search <targets>

Security teams should verify encryption. LDAP without TLS sends credentials in cleartext. Nmap can detect StartTLS support with the ldap-starttls script. If absent, mark it as a high-priority fix.

Misconfigured LDAP is a direct line to sensitive data. Nmap doesn’t just find open ports — it shows what those ports reveal. Regular scanning and immediate remediation reduce risk.

Test your own LDAP targets. See how quickly vulnerabilities surface. Deploy a live environment and run Nmap against it without wasting hours on setup. Go to hoop.dev and watch it happen in minutes.

Get started

See hoop.dev in action

One gateway for every database, container, and AI agent. Deploy in minutes.

Get a demoMore posts