<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>LDAP Server :: goshs Documentation</title>
    <link>https://goshs.de/en/usage/collaboration/ldap/index.html</link>
    <description>How to use goshs as an LDAP server goshs can act as a rogue LDAP server. Any client that connects and authenticates — whether it sends a plaintext DN/password bind, a SASL PLAIN credential, or an NTLM handshake — will have those credentials captured and displayed in real time in the goshs web UI.&#xA;This is useful for:&#xA;Coercing Windows clients or services into authenticating against your server (e.g., via relay or misconfiguration) Exploiting Log4Shell (CVE-2021-44228) and similar JNDI injection vulnerabilities Capturing LDAP bind credentials from misconfigured applications and appliances </description>
    <generator>Hugo</generator>
    <language>en-US</language>
    <lastBuildDate></lastBuildDate>
    <atom:link href="https://goshs.de/en/usage/collaboration/ldap/index.xml" rel="self" type="application/rss+xml" />
  </channel>
</rss>