Hi All,
Thanks for all the replies, I have been in vacation and am just back.
The OpenLDAP server is not seriously patched and the port is really
strange. I will look back at the analysis once again and update.
On Sat, Oct 1, 2016 at 11:20 PM, Dieter Klünter wrote:
> Am
Am Fri, 30 Sep 2016 12:55:47 +0200
schrieb Michael Ströder :
> Sreekanth Sukumaran wrote:
> >
> > Sorry, I missed to add subject in the last mail. Resending with
> > subject. sorry about spamming the group
> >
> > Hi All,
> >
> > OpenLDAP version : 2.4.39 on windows
> >
> On Sep 30, 2016, at 06.55, Michael Ströder wrote:
>
> Sreekanth Sukumaran wrote:
>>
>> Sorry, I missed to add subject in the last mail. Resending with subject.
>> sorry
>> about spamming the group
>>
>> Hi All,
>>
>> OpenLDAP version : 2.4.39 on windows
>> Tool used
Sreekanth Sukumaran wrote:
>
> Sorry, I missed to add subject in the last mail. Resending with subject. sorry
> about spamming the group
>
> Hi All,
>
> OpenLDAP version : 2.4.39 on windows
> Tool used : Microsoft Attack surface analyzer
>
> We have been doing attack surface analysis on
Have you tried to strace it from the startup to the end ?
You would sure see the creation of this port and know more.
That’s the technique I use when the software is blackbox to me.
My strace invocation is using
/usr/bin/strace -fF -ttT -v -o strace.log -s 255
++Cyrille
From: