Active Directory Authentication with NConf

So I had to help someone else with getting NConf working with Active Directory LDAP on a Windows Domain, If you don’t understand the difference between DistinguishedName and sAMAccountName, then you will have some issues.

Currently NConf will only use a DN for successful authentication and authorization (2 steps to getting access to NConf). This means you can’t use your Active Directory username, but instead your DistinguishedName.

If you review the NConf Auth by Active Directory instructions and correctly configure all the options. Using an DistinguishedName of a valid Active Directory account for the username will result in a successful login. Versus using the Active Directory sAMAccountName which is typical the “username” we have all come accustomed to using.

Please note, when specifying the “AD_BASE_DN” as DOMAIN\<username>. You may find success in authenticating, but you won’t have authorization to access NConf. This is due to the memberof logic used in NConf, which fails due to an incorrect Bind DN being provided. It looks like NConf needs to build on the Active Directory integration.

You May Also Like

New Pwnage Tool 2.0.3 and QuickPwn 1.50

I haven't been keeping up with my submissions as of late so this one squeaked through. But the team has updated both their PwnageTool and QuickPwn Tool. There is still however no baseband unlock, just support for new jailbreaking of the new firmware.

Auto Bounced Messages Management vBulletin Module Helps Purge Bad Email Address On Your Forum

I was browsing through my mail spool on my machine, and I noticed that there were some messages in one of my accounts for a vBulletin forum. After further review, it was some bounce backs that had accumulated from users that didn't have a valid email address. I then started to do some Google searches for a vBulletin module (vBulletin's search is horrendous and practically useless) and found this module.