The requesting host is compromised, sending traffic to the DC (the former is running Sharphound to perform recon - though I don't know if that is a part of this). I am very new to LDAP and am clueless as to what this means. Is this malicious? The details are below, any help would be appreciated!
What does this LDAP traffic signify? "<ROOT>" baseObject
1.1k Views Asked by Max At
1
There are 1 best solutions below
Related Questions in ACTIVE-DIRECTORY
- Is there any way to set a printer as default according with Active Directory Policy Security Group and PC hostname?
- Dropdown list showing SQLServer2005SQLBrowserUser$DONSERVER instead of Active Directory group name in ASP.NET MVC C#
- Connecting to SQL Server and performing BULK INSERT from Linux Container
- Running wmi queries as a non-admin user on a remote machine using C#
- How can we make an environment specific Token-based authorization using Ping Token?
- Reuse SSL certificate from the personal certificate store across services such as RDP and Federated Sign In
- Adding user in AD using powershell
- Netbox in docker LDAP authentication
- PowerShell Script Install-ADDSDomainController Error
- Get username of logged in user while using Domain Admin privileges
- Populate Simple AD from LDAP
- Python LDAP3 Changing Account Values
- Powershell - Exporting MemberOf to csv file from active directory
- Filtering users from a CSV then removing those filtered users from specific security groups with Powershell
- Nested Expression in Powershell returning part of Expression
Related Questions in LDAP
- ldap 389ds - logging - cat <> stdout-fifo-pipe-file > /dev/stdout - No AUDIT logs 0 byte file
- Jndi connect to LDAP by GssApi KrbException: Server not found in Kerberos database (7)
- PHP & LDAPS : cant connect to AD
- Netbox in docker LDAP authentication
- LDAP query construction to configure Discovering Products in KMS
- Populate Simple AD from LDAP
- Could not authenticate credentials against "LDAP" - MediaWiki
- LDAP authentication on MQ qmgr
- LDAP: Server is not operational for VB.NET Winforms application
- How do I obtain a user's domain in nginx during authentication through AD with Kerberos?
- LDAP query, geto all user of a group
- In LDAP: Differentiating via OU or via attribute?
- [LDAP: error code 32 - 0000208D: NameErr: DSID-0310028D, problem 2001 (NO_OBJECT), data 0, best match of: 'DC=xxxxxx,DC=int'
- In C#, DirectoryEntry is returning empty AuditRules collection, even though audit rules do exist
- Zeppelin is not allowing LDAP authentication
Related Questions in BLOODHOUND
- `display` option in typeahead.js does not work
- What does this LDAP traffic signify? "<ROOT>" baseObject
- Typeahead Bloodhound Do Something While Prefetch Is Happening
- Neo4j-Bloodhound- Match Cypher querys between nodes
- Typeahead Bloodhound don't close the autocomplete on click
- Symfony 5 Typeahead search
- Typeahead Bloodhound Autocomplete using prefetch + remote when source is a dict from Django
- Supplying remote JSON data for Typeahead / Bloodhound with Django / Python
- Is it possible to remove entry from Bloodhound index manually?
- What are Base nodes?
- typeahead.js does not get data from local
- Core JS Typeahead Bloodhound - results available read to screen reader
- Can I have typeahead/bloodhound always show what the user is typing?
- Multiple Remote Sources with Twitter Typeahead.js
- How to use Bloodhound with a JSON created with flask jsonify
Trending Questions
- UIImageView Frame Doesn't Reflect Constraints
- Is it possible to use adb commands to click on a view by finding its ID?
- How to create a new web character symbol recognizable by html/javascript?
- Why isn't my CSS3 animation smooth in Google Chrome (but very smooth on other browsers)?
- Heap Gives Page Fault
- Connect ffmpeg to Visual Studio 2008
- Both Object- and ValueAnimator jumps when Duration is set above API LvL 24
- How to avoid default initialization of objects in std::vector?
- second argument of the command line arguments in a format other than char** argv or char* argv[]
- How to improve efficiency of algorithm which generates next lexicographic permutation?
- Navigating to the another actvity app getting crash in android
- How to read the particular message format in android and store in sqlite database?
- Resetting inventory status after order is cancelled
- Efficiently compute powers of X in SSE/AVX
- Insert into an external database using ajax and php : POST 500 (Internal Server Error)
Popular Questions
- How do I undo the most recent local commits in Git?
- How can I remove a specific item from an array in JavaScript?
- How do I delete a Git branch locally and remotely?
- Find all files containing a specific text (string) on Linux?
- How do I revert a Git repository to a previous commit?
- How do I create an HTML button that acts like a link?
- How do I check out a remote Git branch?
- How do I force "git pull" to overwrite local files?
- How do I list all files of a directory?
- How to check whether a string contains a substring in JavaScript?
- How do I redirect to another webpage?
- How can I iterate over rows in a Pandas DataFrame?
- How do I convert a String to an int in Java?
- Does Python have a string 'contains' substring method?
- How do I check if a string contains a specific word?


For regular LDAP over TCP, the "null DN" entry (indicated as <ROOT> by Wireshark) is often called the "rootDSE", and is used for protocol negotiation – it contains attributes indicating what LDAP protocol extensions are supported by the server. For example, whenever an LDAP client wants to use SASL authentication or StartTLS, it first makes a query for the rootDSE entry to make sure that's available:
(The rootDSE also has some AD-specific parameters, but that's not its main purpose.)
Seeing such requests over TCP is normal for any LDAP communications.
The CLDAP request over UDP is a slightly different thing – it's an Netlogon ping used by Windows AD clients to quickly check communications with a domain controller. It serves a similar purpose as the above rootDSE search, but deals with AD Netlogon parameters rather than LDAP parameters.
Seeing an occassional CLDAP ping from any AD member to your DCs is normal (as long as their payload makes sense, and as long as it's not a flood of requests).