I get what you are saying, but you miss what I really said. We are running advanced security labs and hacking labs with tools that can exploit LDAP, Windows Systems, SQL and so much more. Here are some excellent references in the book "The Web Application Hackers handbook second edition" or ldap-exploiter, ldap-brute and many other tools out there. We actually write the labs to train security professional on how to exploit, I am just being gingerly as possible not to give any secret sauce away. Hint my broad examples.
In the world of cybersecurity; we don't guard against the 99% we guard against that 1%. Again my apologies for using a broad term. Thank You -- Sent from: http://apache-guacamole-general-user-mailing-list.2363388.n4.nabble.com/
