Introduction to LDAP Injections
Use LDAP? If your applications allow any sort of user-input in LDAP queries, you could be vulnerable to LDAP injections. In this ebook, we provide an introduction to LDAP injections with realistic examples of attacks, different techniques that can be used by threat agents, and primary as well as secondary defense options to prevent those attacks from happening against your own applications.
This introduction to LDAP Injections is an excerpt from our Injection Attacks: The Free 2020 Guide course.