A vulnerability where attacker-controlled input is used to manipulate LDAP queries, potentially allowing unauthorized data access or authentication bypass.
Put theory into practice with real hacking labs, CTF challenges, and guided courses on Parrot CTFs Events.
Get Started Free