
This allows us to see the SSL handshake process, including the “Server Hello”: Filter your capture display by the IP address of the computer sending LDAP traffic and by “TLS”. In my example, this returned lots of unreadable data:ģ. LDAP query) through a few levels until I return data for a user named Alice Scott. Then I bind with my credentials and navigate (i.e. It’s included in Win2008/2008 R2/Vista RSAT/7 RSAT.Īnd connect with port 636 and SSL set. LDP also obeys orders unlike many third party apps. In my examples, I useīecause it’s the closest thing to a “pure” LDAP client in Windows PowerShell, ADSIEDIT, and other tools usually go through various levels of abstraction. Naturally, you won’t be able to easily capture an LDAP application running on a DC itself, so use at least two computers to test. Make the application start sending encrypted LDAP traffic. Fire up NetMon, pick your network(s), and start capturing without filters.Ģ. It goes without saying that this is all being done in your test lab, mmmmmkay. They are probably not AskDS readers so using our Comments section is not the best use of your time. NMDecrypt has its own support channels with a If you are troubleshooting a non-Windows OS then the DC is your only choice, obviously. Install these on the computer that’s talking LDAP this could be the DC or a member server or a client or whatever. Let them write some darned blog posts for once. This is also possible to do in WireShark but naturally, you’re on your own there. I’m not going to explain LDAP and SSL as we already have some great articles by James, Mike, Rob, Randy, and Dave here:


Since the traffic is all encrypted on the wire, ordinary network captures are useless. This is useful when you need to see what an application is asking your domain controllers, especially when that app has lousy logging. Today I show you how to decrypt LDAP traffic protected by SSL by using First published on TechNet on Nov 17, 2010
