Protocols
AD relies on selected essential protocols:
389: Lightweight Directory Access Protocol (LDAP)
88: Kerberos (and/or)
DNS
MSRPC
DNS (53)
The Domain Name System protocol in Active Directory enables servers and clients to perform functions such as discovering domain controllers and communicating with other domain controllers that host directory services.
To implement this, internal networks use Active Directory DNS namespaces. Specifically, Active Directory maintains a database of services running on the network. This database consists of service record entries, which are used by services to discover other services.
As soon as a client enters the network, it sends a request to the DNS service to translate a domain into the service's IP.
By default, DNS uses port 53 and UDP. It is also possible for DNS to use tcp as a fallback if a connection fails or the packet size is greater than 512 bytes.
To perform a DNS query manually, you can use tools such as nslookup:
Example:
You can even perform a DNS query for the FQDN of a domain controller:
MSRPC (135)
Inter-process communication (IPC) techniques are widely used in client-server model-based applications to facilitate communication and data exchange between processes running on different machines or within the same system. In the context of Windows environments, there are several key interfaces related to Active Directory and domain management that provide critical functionalities for authentication, authorization, and management of security principals. Some interesting examples include:
These interfaces and protocols are vital for managing and interacting with Active Directory, but they also present potential attack vectors. Tightening security configurations, such as restricting access to sensitive protocols and using least-privilege principles, can help mitigate these risks.
LDAP (389)
Active Directory (AD) supports LDAP (Lightweight Directory Access Protocol) for directory lookups, using port 389 for standard LDAP communication and port 636 for LDAP over SSL (LDAPS). LDAP serves as the protocol through which applications communicate with servers providing directory services.
In AD, this enables the exchange of information such as user details, security settings, and passwords between applications and the directory. LDAP sessions begin by establishing a connection to an LDAP server, which functions as the Directory System Agent (DSA). In AD, Domain Controllers (DCs) fulfill this role, listening for LDAP requests, particularly those related to LDAP authentication.
This process can be compared to the way an Apache web server handles HTTP requests, with LDAP acting as the "language" that facilitates communication between applications and the directory services provided by AD.
Authentication
There are several types of authentication methods in LDAP:
SASL-based authentication helps in protecting credentials, as it supports more robust authentication methods beyond simple username and password, like Kerberos, which can prevent sending credentials over the network in plain text.
LDAPS (636)
In progress....
Kerberos/NTLM
See:
Last updated
Was this helpful?