2011
DOI: 10.4236/jis.2011.24015
|View full text |Cite
|
Sign up to set email alerts
|

Vulnerabilities of LDAP As An Authentication Service

Abstract: Lightweight Directory Access Protocol (LDAP) servers are widely used to authenticate users in enterprise level networks. Organizations such as universities and small to medium-sized businesses use LDAP for a variety of applications including e-mail clients, SSH, and workstation authentication. Since many organizations build dependencies on the LDAP service, a Denial-of-Service (DoS) attack to the service can cause a greater number of services disrupted. This paper examines the danger in the use of LDAP for use… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2012
2012
2023
2023

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(4 citation statements)
references
References 6 publications
0
4
0
Order By: Relevance
“…The authors present injection techniques by manipulating the filters used for searching the directory services. Obimbo et al present the risks of using LDAP as an authentication protocol by executing a DoS attack exploiting the TCP threeway handshake required for connection initialization with an LDAP server [4]. More recently, Jeitner et al presented techniques to inject malicious payloads to launch injection attacks on protocols like DNS, LDAP, and Eduroam [6].…”
Section: Ldap Attacksmentioning
confidence: 99%
See 1 more Smart Citation
“…The authors present injection techniques by manipulating the filters used for searching the directory services. Obimbo et al present the risks of using LDAP as an authentication protocol by executing a DoS attack exploiting the TCP threeway handshake required for connection initialization with an LDAP server [4]. More recently, Jeitner et al presented techniques to inject malicious payloads to launch injection attacks on protocols like DNS, LDAP, and Eduroam [6].…”
Section: Ldap Attacksmentioning
confidence: 99%
“…However, over the years, there have been many vulnerabilities in LDAP that enable injection attacks, unauthorized access, and remote code execution capabilities [4]- [6]. As many enterprise applications use LDAP for authentication, attackers are highly motivated to exploit the protocol to gain unauthorized access into the targeted infrastructure.…”
Section: Introductionmentioning
confidence: 99%
“…Vulnerabilities of LDAP as an Authentication Service. [9] LDAP, Authentication service, Denial.of-service, SYN Flooding.…”
Section: A6mentioning
confidence: 99%
“…Several methods [5][6][7][8][9][10][11][12] have been proposed to prevent the SQL injection attack to the web-based application. These include adding some parameterized strings to the SQL commands, using a virtual database connectivity drive or extracting the basic structure of a SQL statement, creating the unpredictable instances of the language, and combining the static application code analysis with runtime validation.…”
Section: Introductionmentioning
confidence: 99%