In a compromised Active Directory environment, which port and tool combination is typically used to interrogate LDAP on a Domain Controller?

Enhance your knowledge as a Computer Hacking Forensic Investigator with the CHFI v11 Test. Use flashcards and multiple-choice questions, complete with hints and detailed explanations, to prepare effectively and ace your exam!

Multiple Choice

In a compromised Active Directory environment, which port and tool combination is typically used to interrogate LDAP on a Domain Controller?

Explanation:
LDAP interrogation on a Domain Controller uses the LDAP protocol over port 389, and a built-in Windows LDAP client like ldp.exe is typically used to connect, bind with credentials, and run searches to enumerate AD objects such as users, groups, and their attributes. This pairing is common in compromised AD environments because it provides direct access to the directory data you want to map and extract. Other options don’t fit because SSH on port 22 with PuTTY is for remote shell access, not LDAP; HTTPS on port 443 with curl targets web services, not directory data; and DNS on port 53 with dig is for name resolution, not querying AD objects. LDAPS on port 636 exists, but the standard, unencrypted LDAP path on 389 with a tool like ldp.exe is the typical method for interrogation.

LDAP interrogation on a Domain Controller uses the LDAP protocol over port 389, and a built-in Windows LDAP client like ldp.exe is typically used to connect, bind with credentials, and run searches to enumerate AD objects such as users, groups, and their attributes. This pairing is common in compromised AD environments because it provides direct access to the directory data you want to map and extract. Other options don’t fit because SSH on port 22 with PuTTY is for remote shell access, not LDAP; HTTPS on port 443 with curl targets web services, not directory data; and DNS on port 53 with dig is for name resolution, not querying AD objects. LDAPS on port 636 exists, but the standard, unencrypted LDAP path on 389 with a tool like ldp.exe is the typical method for interrogation.

Subscribe

Get the latest from Examzify

You can unsubscribe at any time. Read our privacy policy