Suspicious LDAP (Lightweight Directory Access Protocol) queries are often indicative of reconnaissance activities within a network. Attackers use LDAP queries to enumerate and gather information about users, groups, computers, and other directory objects within an Active Directory environment. This detection identifies abnormal LDAP query patterns that deviate from typical usage, potentially signaling malicious intent.
Once an adversary has access to the network, they’re going to begin the internal reconnaissance or ‘discovery’ phase to identify what level of access they have.
There are several ways to achieve this, which Vectra AI offers strong detection coverage for out of the box, but a prominent way is by querying active directory over LDAP (Lightweight Directory Access Protocol) which is an industry standard and a default protocol for Active Directory servers.
Using LDAP we can identify computers, accounts, groups and applications within the domain. Using this information, we can quickly identify targets of interest, why waste your time cracking passwords if the accounts won’t give you the permissions you need to RDP from your current host to the domain controller?
Common tools that leverage LDAP include Bloodhound, Sharphound and ADFind.