New Tool – LDAP Password Kracker

Here comes our 91st new tool – LDAP Directory Kracker .  Useful tool to recover the lost password from any of the LDAP based Directory Servers.




Many companies, universities use Directory Servers to store sensitive information such as employee account details, salary, trade secrets etc. In this direction, this tool can greatly help Penetration testers to find wealth of secret details by exposing weak user passwords.



It can recover the lost password from all of these popular LDAP Directory Servers

  • Novell eDirectory
  • Microsoft Active Directory
  • Open LDAP Directory
  • Sun One Directory
  • Netscape Directory
  • IBM Lotus Domino
  • Oracle Directory
  • OpenDS Directory



It comes with elegant and user friendly interface like most of our tools. It supports Dictionary Crack method and comes with default password list file.



For more interesting details kindly visit LDAP Directory Kracker

Similar posts
  • Microsoft MCSE Certification: Your Ne... Microsoft MCSE is the most in-demand certification for all those professionals who work in the Information Technology industry. Most IT companies prefer hiring those workers who carry the Microsoft MCSE certificate. That is why most of the IT job applicants today try to get certified by Microsoft. In the competitive job market, MCSE helps an [...]
  • Computer Security Tips: Stay Safe Onl... In recent times cyber security has raised the level of awareness and public consciousness as never before. Both large corporations and big organizations try to take care of online security as much as they can. That’s why cyber criminals and hackers have focused more on smaller companies and single entrepreneurs. This awful tendency leads to [...]
  • Bamital Analysis using Malpimp and Py... A couple of months ago, I released my two new tools Malpimp and PyMal for malware analysis. Malpimp aims at API tracing and PyMal is a general purpose malware analysis tool. In this blog I will discuss how to use both of them in malware analysis. As a case study I am using Bamital botnet [...]
  • Advanced Malware Analysis Training Se... Here is the quick update on this month’s Local Security meet (SX/Null/G4H/owasp) and our advanced malware training session on Introduction to Android This is part of our FREE ‘Advanced Malware Analysis Training’ series started from Dec 2012.   In this session, Swapnil gave quick introduction to Android explaining technical details as well as various security [...]
  • Advanced Malware Analysis Training Se... Here is the quick update on this month’s Local Security meet (SX/Null/G4H/owasp) and our advanced malware training session on Malware Memory Forensics. This is part of our FREE ‘Advanced Malware Analysis Training’ series started from Dec 2012.   In this extended session, Monnappa explained extracting malware forensics artifacts from memory using Volatility – advanced memory [...]

Leave a Reply