Reconnaissance Techniques
Initial information gathering techniques to identify FreeIPA deployments and their components.
Network Discovery
The first step in penetration testing a FreeIPA deployment is to identify potential FreeIPA servers on the network. This involves scanning for hosts running specific services associated with FreeIPA.
Port Scanning
FreeIPA servers typically run several services on specific ports. Scanning for these ports can help identify potential FreeIPA servers.
Key FreeIPA Ports:
- 80/443 - Web UI
- 389/636 - LDAP/LDAPS
- 88/464 - Kerberos
- 53 - DNS
- 123 - NTP
- 749 - Kerberos Admin
Network Range Scanning
When the exact location of FreeIPA servers is unknown, scanning network ranges can help identify potential targets.
Diagram showing the process of network scanning to identify FreeIPA servers
DNS Enumeration
DNS enumeration can reveal valuable information about the FreeIPA infrastructure without directly interacting with the servers. FreeIPA uses DNS SRV records to advertise services.
DNS Enumeration Tip
Zone Transfer Attempts
Although rarely successful in modern environments, attempting a zone transfer can sometimes reveal valuable information about the domain.
Service Identification
Once potential FreeIPA servers are identified, the next step is to confirm their role and gather more information about the services they're running.
LDAP Service Identification
LDAP is a core component of FreeIPA. Identifying and gathering information from LDAP services can provide valuable insights.
LDAP Identification Tip:
FreeIPA LDAP servers typically have naming contexts that include "cn=accounts" and "cn=schema". The presence of these contexts can help confirm that the server is running FreeIPA.
Kerberos Service Identification
Kerberos is used for authentication in FreeIPA. Confirming the presence of Kerberos services can help identify FreeIPA servers.
Diagram showing the core services in a FreeIPA deployment
Web Interface Analysis
FreeIPA provides a web interface for administration. Analyzing this interface can reveal information about the FreeIPA deployment, including version information.
Screenshot Analysis
Taking screenshots of the web interface can help document the environment and identify potential vulnerabilities.
Example FreeIPA login page
Example FreeIPA dashboard (after authentication)
Web Interface Analysis Tip:
The FreeIPA web interface often reveals version information in the page source or HTTP headers. This information can be used to identify known vulnerabilities in specific versions of FreeIPA.