Hardening the security of your network perimeter is crucial, but there is a preliminary step in many attack cycles to keep in mind: Light Weight Directory Access Protocol (LDAP) reconnaissance, or domain recon. Domain recon, the process of investigating and identifying the critical or vulnerable parts in an organization’s network, can help an attacker plan their next moves and target their attacks. 

What you'll find in this e-book:

What is LDAP reconnaissance, and how is it utilized by attackers? 
Real-world scenarios on how users with no privilege can perform recon, and how that could cause a large-scale security breach.
How to detect reconnaissance attempts in real time and eliminate the possibility of a data breach.

Download the e-book

Thank you for your interest!

If you don't find the e-book in your inbox within the next few minutes, please check your spam folder.

  • Please enter Name
  • Please enter work email address
  • Please enter phone number
  • Please select a personalized demo date
  • By clicking 'Get your copy now (.pdf)' you agree to processing of personal data according to the Privacy Policy.

Domain reconnaissance can be the start of a large-scale security breach.


To view the complete video and more, please register