Course
In this lab, you will learn how to exploit LDAP injection vulnerabilities to bypass authentication checks. This includes understanding LDAP syntax, utilizing boolean logic, and crafting payloads to manipulate LDAP queries.
Skills covered
Injection
Authentication
Operating System
CWE-90
Ready to practice?
Get access to this lab and 600+ hands-on exercises with a PRO subscription.