{"id":35208,"date":"2024-10-23T06:52:57","date_gmt":"2024-10-23T06:52:57","guid":{"rendered":"https:\/\/kalilinuxtutorials.com\/?p=35208"},"modified":"2024-10-23T06:52:59","modified_gmt":"2024-10-23T06:52:59","slug":"maldaptive","status":"publish","type":"post","link":"https:\/\/kalilinuxtutorials.com\/maldaptive\/","title":{"rendered":"MaLDAPtive &#8211; Pioneering LDAP SearchFilter Parsing And Security Framework"},"content":{"rendered":"\n<p>MaLDAPtive is a framework for LDAP SearchFilter parsing, obfuscation, deobfuscation and detection.<\/p>\n\n\n\n<p>Its foundation is a 100% custom-built C# LDAP parser that handles tokenization and syntax tree parsing along with numerous custom properties that enable accurate and efficient obfuscation, deobfuscation and detection of LDAP SearchFilters. <\/p>\n\n\n\n<p>The rest of the project is a PowerShell wrapper designed for maximum flexibility, randomization and pipeline capabilities for seamlessly connecting all desired functions in a single command.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Release Details<a href=\"https:\/\/github.com\/MaLDAPtive\/Invoke-Maldaptive?tab=readme-ov-file#release-details\"><\/a><\/strong><\/h2>\n\n\n\n<p>As defenders, from the very beginning of this research we wanted to release the information and framework in a responsible manner and decided on a two-stage release. <\/p>\n\n\n\n<p>This decision was nobody&#8217;s but our own and we made this two-stage approach crystal clear in our CFP submissions.<\/p>\n\n\n\n<p><strong>Therefore, in the initial release of this research we are publishing all code EXCEPT the obfuscation module.<\/strong> <\/p>\n\n\n\n<p>After at least 4 months we will then release the obfuscation module along with a Part II of this research (exact date TBD based on pending CFP submission).<\/p>\n\n\n\n<p>Our intention is to give defenders a multi-month head start on setting up required LDAP SearchRequest telemetry and implementing the full detection ruleset that we published with this research.<\/p>\n\n\n\n<figure class=\"wp-block-table\"><table class=\"has-fixed-layout\"><thead><tr><th>Module Name<\/th><th>Release Date<\/th><\/tr><\/thead><tbody><tr><td>LDAP Parser<\/td><td>2024-08-07<\/td><\/tr><tr><td>Deobfuscation Module<\/td><td>2024-08-07<\/td><\/tr><tr><td>Detection Module<\/td><td>2024-08-07<\/td><\/tr><tr><td>Detection Ruleset<\/td><td>2024-08-07<\/td><\/tr><tr><td>Telemetry Module<\/td><td>2024-08-07<\/td><\/tr><tr><td>Obfuscation Corpus<\/td><td>2024-08-07<\/td><\/tr><tr><td>Obfuscation Module<\/td><td>Intentionally delayed release<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Installation<\/strong><\/h2>\n\n\n\n<pre class=\"wp-block-code\"><code>Import-Module .\/Maldaptive.psd1<\/code><\/pre>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Required Packages<\/strong><\/h2>\n\n\n\n<pre class=\"wp-block-code\"><code>PowerShell 7.1\n.NET 6.0 (LTS)<\/code><\/pre>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Usage<\/strong><\/h2>\n\n\n\n<p><a href=\"https:\/\/github.com\/MaLDAPtive\/Invoke-Maldaptive?tab=readme-ov-file#usage\"><\/a>Interactive mode is a colorful, menu-driven experience found in the <code>Invoke-Maldaptive<\/code> function (which also supports non-interactive capabilities via its own built-in CLI). <\/p>\n\n\n\n<p>It is designed to promote exploration of all available functions with colored highlighting applied to amplify the important details returned from each function. <\/p>\n\n\n\n<p>There is also some special animated ASCII art in this function, so we recommend giving it a whirl first.<\/p>\n\n\n\n<p>Menu exploration supports full regex and basic wildcards, with special automated menu traversal options defined by <code>**<\/code>, <code>***<\/code> and <code>****<\/code> commands. You can always type <code>HELP<\/code> or <code>TUTORIAL<\/code> for more guidance.<\/p>\n\n\n\n<p>At any point the full details of each layer of obfuscation or deobfuscation can be viewed, copied or fully exported out of the interactive menu. <\/p>\n\n\n\n<p>MaLDAPtive also has full CLI support displayed in the same menu, so interactive mode can be used to &#8220;create obfuscation recipes&#8221; that can easily be exported into simple 1-liner commands.<\/p>\n\n\n\n<p>For more information click <a href=\"https:\/\/github.com\/MaLDAPtive\/Invoke-Maldaptive?tab=readme-ov-file\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">here<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>MaLDAPtive is a framework for LDAP SearchFilter parsing, obfuscation, deobfuscation and detection. Its foundation is a 100% custom-built C# LDAP parser that handles tokenization and syntax tree parsing along with numerous custom properties that enable accurate and efficient obfuscation, deobfuscation and detection of LDAP SearchFilters. The rest of the project is a PowerShell wrapper designed [&hellip;]<\/p>\n","protected":false},"author":12,"featured_media":35213,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"fifu_image_url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEg_WpKHJ1IDGUReh8DNdc-ZdaEBGQHIL6BFnKcFzQnC8_THc1kWprVPvwI_eLtXRxhrQzgT-3ukR2AlnWV0xmfTxkG3ZcPRIWJ13hJx7atYkhcJRrU4F-NZ-MfqePta1uuOvH8Mb_oQqX9sYdshO2L9tLQiYV3S11BhLET3ViAQpghL6889RC-CM01_u2Sl\/s1600\/MaLDAPtive%20.webp","fifu_image_alt":"","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[20,25],"tags":[737,6321,6052,6325,6957],"class_list":["post-35208","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyber-security","category-hacking-tools","tag-cybersecurity","tag-informationsecurity","tag-kalilinux","tag-kalilinuxtools","tag-maldaptive"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>MaLDAPtive - Pioneering LDAP SearchFilter Parsing And Security<\/title>\n<meta name=\"description\" content=\"MaLDAPtive is a framework for LDAP SearchFilter parsing, obfuscation, deobfuscation and detection.Its foundation is a 100% custom-built\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/kalilinuxtutorials.com\/maldaptive\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"MaLDAPtive - Pioneering LDAP SearchFilter Parsing And Security\" \/>\n<meta property=\"og:description\" content=\"MaLDAPtive is a framework for LDAP SearchFilter parsing, obfuscation, deobfuscation and detection.Its foundation is a 100% custom-built\" \/>\n<meta property=\"og:url\" content=\"https:\/\/kalilinuxtutorials.com\/maldaptive\/\" \/>\n<meta property=\"og:site_name\" content=\"Kali Linux Tutorials\" \/>\n<meta property=\"article:published_time\" content=\"2024-10-23T06:52:57+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-10-23T06:52:59+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEg_WpKHJ1IDGUReh8DNdc-ZdaEBGQHIL6BFnKcFzQnC8_THc1kWprVPvwI_eLtXRxhrQzgT-3ukR2AlnWV0xmfTxkG3ZcPRIWJ13hJx7atYkhcJRrU4F-NZ-MfqePta1uuOvH8Mb_oQqX9sYdshO2L9tLQiYV3S11BhLET3ViAQpghL6889RC-CM01_u2Sl\/s1600\/MaLDAPtive%20.webp\" \/>\n<meta name=\"author\" content=\"Varshini\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEg_WpKHJ1IDGUReh8DNdc-ZdaEBGQHIL6BFnKcFzQnC8_THc1kWprVPvwI_eLtXRxhrQzgT-3ukR2AlnWV0xmfTxkG3ZcPRIWJ13hJx7atYkhcJRrU4F-NZ-MfqePta1uuOvH8Mb_oQqX9sYdshO2L9tLQiYV3S11BhLET3ViAQpghL6889RC-CM01_u2Sl\/s1600\/MaLDAPtive%20.webp\" \/>\n<meta name=\"twitter:creator\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:site\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Varshini\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/maldaptive\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/maldaptive\/\"},\"author\":{\"name\":\"Varshini\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/3c3b3f82a74146532c4def299fe069fa\"},\"headline\":\"MaLDAPtive &#8211; Pioneering LDAP SearchFilter Parsing And Security Framework\",\"datePublished\":\"2024-10-23T06:52:57+00:00\",\"dateModified\":\"2024-10-23T06:52:59+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/maldaptive\/\"},\"wordCount\":388,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/maldaptive\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEg_WpKHJ1IDGUReh8DNdc-ZdaEBGQHIL6BFnKcFzQnC8_THc1kWprVPvwI_eLtXRxhrQzgT-3ukR2AlnWV0xmfTxkG3ZcPRIWJ13hJx7atYkhcJRrU4F-NZ-MfqePta1uuOvH8Mb_oQqX9sYdshO2L9tLQiYV3S11BhLET3ViAQpghL6889RC-CM01_u2Sl\/s1600\/MaLDAPtive%20.webp\",\"keywords\":[\"cybersecurity\",\"informationsecurity\",\"kalilinux\",\"kalilinuxtools\",\"MaLDAPtive\"],\"articleSection\":[\"Cyber security\",\"Hacking Tools\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/kalilinuxtutorials.com\/maldaptive\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/maldaptive\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/maldaptive\/\",\"name\":\"MaLDAPtive - Pioneering LDAP SearchFilter Parsing And Security\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/maldaptive\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/maldaptive\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEg_WpKHJ1IDGUReh8DNdc-ZdaEBGQHIL6BFnKcFzQnC8_THc1kWprVPvwI_eLtXRxhrQzgT-3ukR2AlnWV0xmfTxkG3ZcPRIWJ13hJx7atYkhcJRrU4F-NZ-MfqePta1uuOvH8Mb_oQqX9sYdshO2L9tLQiYV3S11BhLET3ViAQpghL6889RC-CM01_u2Sl\/s1600\/MaLDAPtive%20.webp\",\"datePublished\":\"2024-10-23T06:52:57+00:00\",\"dateModified\":\"2024-10-23T06:52:59+00:00\",\"description\":\"MaLDAPtive is a framework for LDAP SearchFilter parsing, obfuscation, deobfuscation and detection.Its foundation is a 100% custom-built\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/kalilinuxtutorials.com\/maldaptive\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/maldaptive\/#primaryimage\",\"url\":\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEg_WpKHJ1IDGUReh8DNdc-ZdaEBGQHIL6BFnKcFzQnC8_THc1kWprVPvwI_eLtXRxhrQzgT-3ukR2AlnWV0xmfTxkG3ZcPRIWJ13hJx7atYkhcJRrU4F-NZ-MfqePta1uuOvH8Mb_oQqX9sYdshO2L9tLQiYV3S11BhLET3ViAQpghL6889RC-CM01_u2Sl\/s1600\/MaLDAPtive%20.webp\",\"contentUrl\":\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEg_WpKHJ1IDGUReh8DNdc-ZdaEBGQHIL6BFnKcFzQnC8_THc1kWprVPvwI_eLtXRxhrQzgT-3ukR2AlnWV0xmfTxkG3ZcPRIWJ13hJx7atYkhcJRrU4F-NZ-MfqePta1uuOvH8Mb_oQqX9sYdshO2L9tLQiYV3S11BhLET3ViAQpghL6889RC-CM01_u2Sl\/s1600\/MaLDAPtive%20.webp\",\"width\":\"1600\",\"height\":\"900\"},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"name\":\"Kali Linux Tutorials\",\"description\":\"Kali Linux Tutorials\",\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\",\"name\":\"Kali Linux Tutorials\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"contentUrl\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"width\":272,\"height\":90,\"caption\":\"Kali Linux Tutorials\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/CyberEdition\",\"https:\/\/www.threads.com\/@cybersecurityedition\",\"https:\/\/www.linkedin.com\/company\/cyberedition\",\"https:\/\/www.instagram.com\/cybersecurityedition\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/3c3b3f82a74146532c4def299fe069fa\",\"name\":\"Varshini\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/f19f43637c0f83fb3dcfb498f306b2a9ac0025ce85840ab52ee8c01f5361f269?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/f19f43637c0f83fb3dcfb498f306b2a9ac0025ce85840ab52ee8c01f5361f269?s=96&d=mm&r=g\",\"caption\":\"Varshini\"},\"description\":\"Varshini is a Cyber Security expert in Threat Analysis, Vulnerability Assessment, and Research. Passionate about staying ahead of emerging Threats and Technologies.\",\"sameAs\":[\"http:\/\/kalilinuxtutorials.com\",\"https:\/\/www.linkedin.com\/in\/senthamil-selvan-14043a285\/\"],\"url\":\"https:\/\/kalilinuxtutorials.com\/author\/vinayakagrawal\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"MaLDAPtive - Pioneering LDAP SearchFilter Parsing And Security","description":"MaLDAPtive is a framework for LDAP SearchFilter parsing, obfuscation, deobfuscation and detection.Its foundation is a 100% custom-built","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/kalilinuxtutorials.com\/maldaptive\/","og_locale":"en_US","og_type":"article","og_title":"MaLDAPtive - Pioneering LDAP SearchFilter Parsing And Security","og_description":"MaLDAPtive is a framework for LDAP SearchFilter parsing, obfuscation, deobfuscation and detection.Its foundation is a 100% custom-built","og_url":"https:\/\/kalilinuxtutorials.com\/maldaptive\/","og_site_name":"Kali Linux Tutorials","article_published_time":"2024-10-23T06:52:57+00:00","article_modified_time":"2024-10-23T06:52:59+00:00","og_image":[{"url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEg_WpKHJ1IDGUReh8DNdc-ZdaEBGQHIL6BFnKcFzQnC8_THc1kWprVPvwI_eLtXRxhrQzgT-3ukR2AlnWV0xmfTxkG3ZcPRIWJ13hJx7atYkhcJRrU4F-NZ-MfqePta1uuOvH8Mb_oQqX9sYdshO2L9tLQiYV3S11BhLET3ViAQpghL6889RC-CM01_u2Sl\/s1600\/MaLDAPtive%20.webp","type":"","width":"","height":""}],"author":"Varshini","twitter_card":"summary_large_image","twitter_image":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEg_WpKHJ1IDGUReh8DNdc-ZdaEBGQHIL6BFnKcFzQnC8_THc1kWprVPvwI_eLtXRxhrQzgT-3ukR2AlnWV0xmfTxkG3ZcPRIWJ13hJx7atYkhcJRrU4F-NZ-MfqePta1uuOvH8Mb_oQqX9sYdshO2L9tLQiYV3S11BhLET3ViAQpghL6889RC-CM01_u2Sl\/s1600\/MaLDAPtive%20.webp","twitter_creator":"@CyberEdition","twitter_site":"@CyberEdition","twitter_misc":{"Written by":"Varshini","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/kalilinuxtutorials.com\/maldaptive\/#article","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/maldaptive\/"},"author":{"name":"Varshini","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/3c3b3f82a74146532c4def299fe069fa"},"headline":"MaLDAPtive &#8211; Pioneering LDAP SearchFilter Parsing And Security Framework","datePublished":"2024-10-23T06:52:57+00:00","dateModified":"2024-10-23T06:52:59+00:00","mainEntityOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/maldaptive\/"},"wordCount":388,"commentCount":0,"publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/maldaptive\/#primaryimage"},"thumbnailUrl":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEg_WpKHJ1IDGUReh8DNdc-ZdaEBGQHIL6BFnKcFzQnC8_THc1kWprVPvwI_eLtXRxhrQzgT-3ukR2AlnWV0xmfTxkG3ZcPRIWJ13hJx7atYkhcJRrU4F-NZ-MfqePta1uuOvH8Mb_oQqX9sYdshO2L9tLQiYV3S11BhLET3ViAQpghL6889RC-CM01_u2Sl\/s1600\/MaLDAPtive%20.webp","keywords":["cybersecurity","informationsecurity","kalilinux","kalilinuxtools","MaLDAPtive"],"articleSection":["Cyber security","Hacking Tools"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/kalilinuxtutorials.com\/maldaptive\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/kalilinuxtutorials.com\/maldaptive\/","url":"https:\/\/kalilinuxtutorials.com\/maldaptive\/","name":"MaLDAPtive - Pioneering LDAP SearchFilter Parsing And Security","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/maldaptive\/#primaryimage"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/maldaptive\/#primaryimage"},"thumbnailUrl":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEg_WpKHJ1IDGUReh8DNdc-ZdaEBGQHIL6BFnKcFzQnC8_THc1kWprVPvwI_eLtXRxhrQzgT-3ukR2AlnWV0xmfTxkG3ZcPRIWJ13hJx7atYkhcJRrU4F-NZ-MfqePta1uuOvH8Mb_oQqX9sYdshO2L9tLQiYV3S11BhLET3ViAQpghL6889RC-CM01_u2Sl\/s1600\/MaLDAPtive%20.webp","datePublished":"2024-10-23T06:52:57+00:00","dateModified":"2024-10-23T06:52:59+00:00","description":"MaLDAPtive is a framework for LDAP SearchFilter parsing, obfuscation, deobfuscation and detection.Its foundation is a 100% custom-built","inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/kalilinuxtutorials.com\/maldaptive\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/maldaptive\/#primaryimage","url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEg_WpKHJ1IDGUReh8DNdc-ZdaEBGQHIL6BFnKcFzQnC8_THc1kWprVPvwI_eLtXRxhrQzgT-3ukR2AlnWV0xmfTxkG3ZcPRIWJ13hJx7atYkhcJRrU4F-NZ-MfqePta1uuOvH8Mb_oQqX9sYdshO2L9tLQiYV3S11BhLET3ViAQpghL6889RC-CM01_u2Sl\/s1600\/MaLDAPtive%20.webp","contentUrl":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEg_WpKHJ1IDGUReh8DNdc-ZdaEBGQHIL6BFnKcFzQnC8_THc1kWprVPvwI_eLtXRxhrQzgT-3ukR2AlnWV0xmfTxkG3ZcPRIWJ13hJx7atYkhcJRrU4F-NZ-MfqePta1uuOvH8Mb_oQqX9sYdshO2L9tLQiYV3S11BhLET3ViAQpghL6889RC-CM01_u2Sl\/s1600\/MaLDAPtive%20.webp","width":"1600","height":"900"},{"@type":"WebSite","@id":"https:\/\/kalilinuxtutorials.com\/#website","url":"https:\/\/kalilinuxtutorials.com\/","name":"Kali Linux Tutorials","description":"Kali Linux Tutorials","publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/kalilinuxtutorials.com\/#organization","name":"Kali Linux Tutorials","url":"https:\/\/kalilinuxtutorials.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/","url":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","contentUrl":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","width":272,"height":90,"caption":"Kali Linux Tutorials"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/CyberEdition","https:\/\/www.threads.com\/@cybersecurityedition","https:\/\/www.linkedin.com\/company\/cyberedition","https:\/\/www.instagram.com\/cybersecurityedition\/"]},{"@type":"Person","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/3c3b3f82a74146532c4def299fe069fa","name":"Varshini","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/f19f43637c0f83fb3dcfb498f306b2a9ac0025ce85840ab52ee8c01f5361f269?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f19f43637c0f83fb3dcfb498f306b2a9ac0025ce85840ab52ee8c01f5361f269?s=96&d=mm&r=g","caption":"Varshini"},"description":"Varshini is a Cyber Security expert in Threat Analysis, Vulnerability Assessment, and Research. Passionate about staying ahead of emerging Threats and Technologies.","sameAs":["http:\/\/kalilinuxtutorials.com","https:\/\/www.linkedin.com\/in\/senthamil-selvan-14043a285\/"],"url":"https:\/\/kalilinuxtutorials.com\/author\/vinayakagrawal\/"}]}},"jetpack_featured_media_url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEg_WpKHJ1IDGUReh8DNdc-ZdaEBGQHIL6BFnKcFzQnC8_THc1kWprVPvwI_eLtXRxhrQzgT-3ukR2AlnWV0xmfTxkG3ZcPRIWJ13hJx7atYkhcJRrU4F-NZ-MfqePta1uuOvH8Mb_oQqX9sYdshO2L9tLQiYV3S11BhLET3ViAQpghL6889RC-CM01_u2Sl\/s1600\/MaLDAPtive%20.webp","jetpack_sharing_enabled":true,"jetpack-related-posts":[{"id":35393,"url":"https:\/\/kalilinuxtutorials.com\/skyscalpel\/","url_meta":{"origin":35208,"position":0},"title":"SkyScalpel : The Art Of Cloud Policy Obfuscation And Detection","author":"Varshini","date":"December 6, 2024","format":false,"excerpt":"SkyScalpel is an open-source framework for JSON policy parsing, obfuscation, deobfuscation, and detection in cloud environments. It provides flexible and highly configurable mechanisms to handle JSON-level obfuscation, IAM policy transformations, and the detection of evasive obfuscation techniques in cloud security contexts. Built on a custom C# JSON tokenizer and syntax\u2026","rel":"","context":"In &quot;Cyber security&quot;","block_context":{"text":"Cyber security","link":"https:\/\/kalilinuxtutorials.com\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjDOrg2dcJSsxsS54cJBq346zjg4C6Xlwpn-zd8TCbZqwGPlZygzoY85zri7hcm-5qq1N7Ws6K7a4SmGjSV_erv0H67qO1V2u45NlX8jYqGTQ6cWfdxV5T9iuxS7-xOsnuMKOkmalQysFCjHA2amMYjky39cqNb5i7MU8ScVBFnefinkVkDWtxeuc9PLDuz\/s1600\/SkyScalpel%20.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjDOrg2dcJSsxsS54cJBq346zjg4C6Xlwpn-zd8TCbZqwGPlZygzoY85zri7hcm-5qq1N7Ws6K7a4SmGjSV_erv0H67qO1V2u45NlX8jYqGTQ6cWfdxV5T9iuxS7-xOsnuMKOkmalQysFCjHA2amMYjky39cqNb5i7MU8ScVBFnefinkVkDWtxeuc9PLDuz\/s1600\/SkyScalpel%20.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjDOrg2dcJSsxsS54cJBq346zjg4C6Xlwpn-zd8TCbZqwGPlZygzoY85zri7hcm-5qq1N7Ws6K7a4SmGjSV_erv0H67qO1V2u45NlX8jYqGTQ6cWfdxV5T9iuxS7-xOsnuMKOkmalQysFCjHA2amMYjky39cqNb5i7MU8ScVBFnefinkVkDWtxeuc9PLDuz\/s1600\/SkyScalpel%20.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjDOrg2dcJSsxsS54cJBq346zjg4C6Xlwpn-zd8TCbZqwGPlZygzoY85zri7hcm-5qq1N7Ws6K7a4SmGjSV_erv0H67qO1V2u45NlX8jYqGTQ6cWfdxV5T9iuxS7-xOsnuMKOkmalQysFCjHA2amMYjky39cqNb5i7MU8ScVBFnefinkVkDWtxeuc9PLDuz\/s1600\/SkyScalpel%20.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjDOrg2dcJSsxsS54cJBq346zjg4C6Xlwpn-zd8TCbZqwGPlZygzoY85zri7hcm-5qq1N7Ws6K7a4SmGjSV_erv0H67qO1V2u45NlX8jYqGTQ6cWfdxV5T9iuxS7-xOsnuMKOkmalQysFCjHA2amMYjky39cqNb5i7MU8ScVBFnefinkVkDWtxeuc9PLDuz\/s1600\/SkyScalpel%20.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjDOrg2dcJSsxsS54cJBq346zjg4C6Xlwpn-zd8TCbZqwGPlZygzoY85zri7hcm-5qq1N7Ws6K7a4SmGjSV_erv0H67qO1V2u45NlX8jYqGTQ6cWfdxV5T9iuxS7-xOsnuMKOkmalQysFCjHA2amMYjky39cqNb5i7MU8ScVBFnefinkVkDWtxeuc9PLDuz\/s1600\/SkyScalpel%20.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":26460,"url":"https:\/\/kalilinuxtutorials.com\/silenthound\/","url_meta":{"origin":35208,"position":1},"title":"SilentHound : Quietly Enumerate An Active Directory Domain Via LDAP Parsing Users, Admins, Groups, Etc.","author":"R K","date":"August 16, 2022","format":false,"excerpt":"SilentHound Quietly enumerate an Active Directory Domain via LDAP parsing users, admins, groups, etc. Created by\u00a0Nick Swink\u00a0from\u00a0Layer 8 Security. Installation Using pipenv (recommended method) sudo python3 -m pip install --user pipenvgit clone https:\/\/github.com\/layer8secure\/SilentHound.gitcd silenthoundpipenv install From requirements.txt (legacy) \u00a0This method is not recommended because python-ldap can cause many dependency errors.\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":10162,"url":"https:\/\/kalilinuxtutorials.com\/jackdaw\/","url_meta":{"origin":35208,"position":2},"title":"Jackdaw : Gather Gather Gather","author":"R K","date":"April 8, 2020","format":false,"excerpt":"Jackdaw is here to collect all information in your domain, store it in a SQL database and show you nice graphs on how your domain objects interact with each-other an how a potential attacker may exploit these interactions. It also comes with a handy feature to help you in a\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":9405,"url":"https:\/\/kalilinuxtutorials.com\/abd-advanced-binary-deobfuscation\/","url_meta":{"origin":35208,"position":3},"title":"ABD : Course Materials For Advanced Binary Deobfuscation","author":"R K","date":"February 29, 2020","format":false,"excerpt":"ABD is the course materials for Advanced Binary Deobfuscation by NTT Secure Platform Laboratories Advanced Binary Deobfuscation This repository contains the course materials of Advanced Binary Deobfuscation at the\u00a0Global Cybersecurity Camp (GCC) Tokyo\u00a0in 2020. Course Abstract Reverse engineering is not easy, especially if a binary code is obfuscated. Once obfuscation\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":6310,"url":"https:\/\/kalilinuxtutorials.com\/ldapdomaindump-active-directory-ldap\/","url_meta":{"origin":35208,"position":4},"title":"LdapDomainDump : Active Directory Information Dumper via LDAP","author":"R K","date":"August 26, 2019","format":false,"excerpt":"LDAPDomainDump is an Active Directory information dumper via LDAP. In an Active Directory domain, a lot of interesting information can be retrieved via LDAP by any authenticated user (or machine). This makes LDAP an interesting protocol for gathering information in the recon phase of a pentest of an internal network.\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":31565,"url":"https:\/\/kalilinuxtutorials.com\/ldap-nom-nom\/","url_meta":{"origin":35208,"position":5},"title":"LDAP Nom Nom: Insane-Speed Active Directory User Enumeration via LDAP Ping Exploitation","author":"Varshini","date":"December 21, 2023","format":false,"excerpt":"With the help of LDAP Ping requests (cLDAP), \"LDAP Nom Nom\" is a powerful tool that quickly and quietly brute-forces Active Directory usernames. This piece goes into great detail about LDAP Nom Nom, explaining what it can do and how it might affect cybersecurity. It works very quickly and can\u2026","rel":"","context":"In &quot;Cyber security&quot;","block_context":{"text":"Cyber security","link":"https:\/\/kalilinuxtutorials.com\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhy8u2V015fClTEbOmeIBUnRlfcnnJEzEbBbAMa18eAaZuDJ2_QLPkeB2EJJtW-z7osIJsI6ZjqzhA_-u2TYQamIgqAdu-kVCr2B-GUX2oKrc4P8SZv2bPtF6gqEUWpgp8R9Dwc94-cV_smYAe8NdEVNEdhAF6Gmikoim4oyuMshX_7kP8hyphenhyphenWCqhLGOLQ\/s16000\/LDAP%20Nom%20Nom.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhy8u2V015fClTEbOmeIBUnRlfcnnJEzEbBbAMa18eAaZuDJ2_QLPkeB2EJJtW-z7osIJsI6ZjqzhA_-u2TYQamIgqAdu-kVCr2B-GUX2oKrc4P8SZv2bPtF6gqEUWpgp8R9Dwc94-cV_smYAe8NdEVNEdhAF6Gmikoim4oyuMshX_7kP8hyphenhyphenWCqhLGOLQ\/s16000\/LDAP%20Nom%20Nom.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhy8u2V015fClTEbOmeIBUnRlfcnnJEzEbBbAMa18eAaZuDJ2_QLPkeB2EJJtW-z7osIJsI6ZjqzhA_-u2TYQamIgqAdu-kVCr2B-GUX2oKrc4P8SZv2bPtF6gqEUWpgp8R9Dwc94-cV_smYAe8NdEVNEdhAF6Gmikoim4oyuMshX_7kP8hyphenhyphenWCqhLGOLQ\/s16000\/LDAP%20Nom%20Nom.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhy8u2V015fClTEbOmeIBUnRlfcnnJEzEbBbAMa18eAaZuDJ2_QLPkeB2EJJtW-z7osIJsI6ZjqzhA_-u2TYQamIgqAdu-kVCr2B-GUX2oKrc4P8SZv2bPtF6gqEUWpgp8R9Dwc94-cV_smYAe8NdEVNEdhAF6Gmikoim4oyuMshX_7kP8hyphenhyphenWCqhLGOLQ\/s16000\/LDAP%20Nom%20Nom.webp?resize=700%2C400&ssl=1 2x"},"classes":[]}],"_links":{"self":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/35208","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/users\/12"}],"replies":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/comments?post=35208"}],"version-history":[{"count":4,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/35208\/revisions"}],"predecessor-version":[{"id":35212,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/35208\/revisions\/35212"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/media\/35213"}],"wp:attachment":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/media?parent=35208"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/categories?post=35208"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/tags?post=35208"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}