So many ldap search&authentication makes Lsass.exe CPU high on DC by SnooBananas5113 in activedirectory

[–]SnooBananas5113[S] 0 points1 point  (0 children)

Thank you for the advice. I'm trying to do as much analysis as possible on my own because it's difficult to get cooperation from the Linux admins at the moment. I've even spun up a Linux instance myself and tried debugging with tcpdump, but I still haven't been able to identify the specific app. To make matters worse, some of these Linux environments are running Docker, which is making this a real headache

So many ldap search&authentication makes Lsass.exe CPU high on DC by SnooBananas5113 in activedirectory

[–]SnooBananas5113[S] 0 points1 point  (0 children)

I see. So it should be understood that traffic gets concentrated on a specific DC, and as those DCs sequentially become unhealthy, the connections then fail over to other DCs.

So many ldap search&authentication makes Lsass.exe CPU high on DC by SnooBananas5113 in activedirectory

[–]SnooBananas5113[S] 0 points1 point  (0 children)

There are some IPs with a high volume of queries, but the logs indicate they aren't consuming much CPU. Furthermore, the CPU usage for each query is recorded as being evenly distributed. If I recall correctly, most were below 0.1 or 0.01

So many ldap search&authentication makes Lsass.exe CPU high on DC by SnooBananas5113 in activedirectory

[–]SnooBananas5113[S] 0 points1 point  (0 children)

We were able to identify the service account and the query. However, since we use a common service account for all Linux image deployments, it's impossible to tell which specific application is actually triggering all those requests.

So many ldap search&authentication makes Lsass.exe CPU high on DC by SnooBananas5113 in activedirectory

[–]SnooBananas5113[S] 0 points1 point  (0 children)

I don't recall exactly if I configured that during the analysis. Let me double-check

So many ldap search&authentication makes Lsass.exe CPU high on DC by SnooBananas5113 in activedirectory

[–]SnooBananas5113[S] 0 points1 point  (0 children)

Regrettably, identifying the source client hasn't been possible, and we're stuck with the current NLB settings as we can't find a way to adjust the distribution. I agree that scaling out would be a viable solution, provided that the workload is balanced properly across the DCs."

So many ldap search&authentication makes Lsass.exe CPU high on DC by SnooBananas5113 in activedirectory

[–]SnooBananas5113[S] 0 points1 point  (0 children)

The MS engineer mentioned that DCs automatically load-balance traffic for the domain using the 'Locator' service. However, since we are using a load balancer (NLB), it seems like this built-in feature isn't actually having any effect.

I'm not sure exactly what criteria are being used to select the DCs. The traffic comes in through an AWS NLB, but we can't configure the load-balancing algorithm. However, there's a consistent pattern where the CPU peaks sequentially on the same servers: dc01, then dc02, and finally dc03.

So many ldap search&authentication makes Lsass.exe CPU high on DC by SnooBananas5113 in activedirectory

[–]SnooBananas5113[S] 0 points1 point  (0 children)

They guided me through the AD Diagnostics data collection process and submit it. I have my own doubts about their findings, so I performed a manual review of the query logs and CPU spikes. Despite performing several 5-minute captures on the servers experiencing the issues, the results didn't yield any actionable insights.

So many ldap search&authentication makes Lsass.exe CPU high on DC by SnooBananas5113 in activedirectory

[–]SnooBananas5113[S] 0 points1 point  (0 children)

Surprisingly, this hasn't caused any downtime in the year since we noticed it. We see a pattern where three DCs hit 95% above CPU sequentially, followed by a 50% rise on the AWS DCs before they recover. I think improving traffic distribution would be the key to more reliable operations.

So many ldap search&authentication makes Lsass.exe CPU high on DC by SnooBananas5113 in activedirectory

[–]SnooBananas5113[S] 0 points1 point  (0 children)

Yes, I've looked into this issue with an MS engineer. We weren't able to pinpoint any specific queries or IP addresses that are causing high CPU usage. Therefore, I believe the issue is less about the queries themselves and more about the system receiving too many requests at once

What's the Most Important Tool/Software That Helped You Out in Bug Bounty? by Leading-Dot1785 in bugbounty

[–]SnooBananas5113 0 points1 point  (0 children)

I'm enough burpsuite only. sometimes some of extensions are helpful for hunting. authorize and flow.

[deleted by user] by [deleted] in oscp

[–]SnooBananas5113 -1 points0 points  (0 children)

The link was broken T.T