Hardening the security of your network perimeter is crucial, but there is a preliminary step in many attack cycles to keep in mind: Light Weight Directory Access Protocol (LDAP) reconnaissance, or domain recon. Domain recon, the process of investigating and identifying the critical or vulnerable parts in an organisation’s network, can help an attacker plan their next moves and target their attacks.
Key takeaways from this eBook:
- What LDAP reconnaissance is and how it is utilised by attackers.
- Real-world scenarios on how users with no privilege can perform recon, and how that could cause a large-scale security breach.
- How to detect reconnaissance attempts in real time and eliminate the possibility of a data breach.