RE: Oracle Bruteforce

From: balaji.v@plynt.com
Date: Mon Aug 07 2006 - 10:40:01 EDT


Hi Offset & David,

For remote scanning/enumeration for default passwords,
You can check out the OScanner tool at
http://www.vulnerabilityassessment.co.uk/oscanner.htm
You need to know the IP and Port where the Oracle DB server is running
(which you can get through any post scanner) but the SIDs aren't
required. Infact this tool will enumerate all the SIDs running on the
DB server.
You can also replace the 'accounts.default' file included in oscanner
with this exhaustive list here:
http://www.vulnerabilityassessment.co.uk/accounts.default

You can also use the Oracle Auditing tools at
http://www.vulnerabilityassessment.co.uk/oat.htm

Incase you have obtained the hashes and wanted to bruteforce,
In addition, you can use this Oracle default password list with their
hashes available at:
http://www.petefinnigan.com/default/oracle_default_passwords.htm

If you want to bruteforce, then i guess Orabf (referred by Carl-Johan)
is good.

Regards,
Balaji
Plynt - www.plynt.com
Magazine - http://palisade.plynt.com

> -------- Original Message --------
> Subject: Re: Oracle Bruteforce
> From: offset <offset@ubersecurity.org>
> Date: Tue, August 01, 2006 9:26 pm
> To: pen-test@securityfocus.com
>
> On a related note, I'd be interested in tools/techniques for testing "default" oracle passwords from remote
>
> Meaning, a network sweep for oracle databases and determine if any are using default passwords/accounts.
>
> From what I'm finding so far, it seems you have to know what databases are running first, not sure if there
> is a way to enumerate this if you dont have access to the tnsnames.ora file from remote.
>
> thanks in advance,
> -off
>
> On Mon, Jul 31, 2006 at 05:47:38PM -0500, David Eduardo Acosta Rodriguez wrote:
> > Hi all:
> >
> > Somebody knows any utility to bruteforce oracle passwords obtained from the
> > dba_users view?
> >
> > Thanks,
> >
> > David Acosta CISSP/CISM
>
> ------------------------------------------------------------------------------
> This List Sponsored by: Cenzic
>
> Concerned about Web Application Security?
> Why not go with the #1 solution - Cenzic, the only one to win the Analyst's
> Choice Award from eWeek. As attacks through web applications continue to rise,
> you need to proactively protect your applications from hackers. Cenzic has the
> most comprehensive solutions to meet your application security penetration
> testing and vulnerability management needs. You have an option to go with a
> managed service (Cenzic ClickToSecure) or an enterprise software
> (Cenzic Hailstorm). Download FREE whitepaper on how a managed service can
> help you: http://www.cenzic.com/news_events/wpappsec.php
> And, now for a limited time we can do a FREE audit for you to confirm your
> results from other product. Contact us at request@cenzic.com for details.
> ------------------------------------------------------------------------------

------------------------------------------------------------------------------
This List Sponsored by: Cenzic

Concerned about Web Application Security?
Why not go with the #1 solution - Cenzic, the only one to win the Analyst's
Choice Award from eWeek. As attacks through web applications continue to rise,
you need to proactively protect your applications from hackers. Cenzic has the
most comprehensive solutions to meet your application security penetration
testing and vulnerability management needs. You have an option to go with a
managed service (Cenzic ClickToSecure) or an enterprise software
(Cenzic Hailstorm). Download FREE whitepaper on how a managed service can
help you: http://www.cenzic.com/news_events/wpappsec.php
And, now for a limited time we can do a FREE audit for you to confirm your
results from other product. Contact us at request@cenzic.com for details.
------------------------------------------------------------------------------



This archive was generated by hypermail 2.1.7 : Sat Apr 12 2008 - 10:56:36 EDT