You are required to produce a 2,500 words report discussing in detail how LDAP can be used as part of a penetration test to enumerate a domain, a host and exploit a vulnerability, In particular attention should be paid to the following questions
1. What is LDAP and how does it function?
2. How can LDAP be used to enumerate a Domain, a Host
3. What vulnerabilities are associated with LDAP and how can they be exploited?
4. How can the security problems associated with LDAP be mitigated?
You should illustrate your analysis with examples to show how this particular attack functions, and how it could be used to gain unauthorised access to a target system.
There needs to be a reference list produced of 6-10 books and some weblinks for research