Skip to content

Conversation

@vikerup
Copy link

@vikerup vikerup commented Dec 16, 2025

Implementation of LDAP STARTTLS. Useful if LDAPS in unavailable while DC still requires signing/TLS

Get kerberos ticket:

getTGT.py test.local/administrator:$DAPW

export KRB5CCNAME=~/administrator.ccache
pywhisker  -t demomachine\$ -a list -u administrator -k --dc-ip 100.64.5.200 -d test.local
[!] automatic bind not successful - strongerAuthRequired
pywhisker  -t demomachine\$ -a list -u administrator -k --dc-ip 100.64.5.200 -d test.local --use-starttls
[*] Searching for the target account
[*] Target user found: CN=DEMOMACHINE,CN=Computers,DC=test,DC=local
[*] Listing devices for demomachine$
[*] DeviceID: fbf8fb45-7e50-c9a8-dd82-c65676d9c082 | Creation Time (UTC): 2025-10-03 12:32:57.648661

@vikerup
Copy link
Author

vikerup commented Dec 17, 2025

pywhisker is using ldap3 which does not seem to support username+password or NTLM hash when LDAP signing is enforced:

cannatag/ldap3#889
cannatag/ldap3#1049

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant