Saturday, November 19, 2022
HomeHackerHome windows Oracle Database Assault Toolkit

Home windows Oracle Database Assault Toolkit




Easy port of the favored Oracle Database Assault Software (ODAT) (https://github.com/quentinhardy/odat) to C# .Web Framework. Credit score to https://github.com/quentinhardy/odat as numerous the performance are ported from his code.

  • Carry out password based mostly assaults e.g. username as password, username listing towards given password, password listing towards given username, username:move combolist.
  • Take a look at if a credential/connection string is working towards goal
  • Brute power assaults to find legitimate SID/ServiceNames
  • Carry out discovery of legitimate TNS listeners towards supplied goal file or CIDR vary
  • Extra to return, I hope!

Disclaimer

I take not accountability on your use of the software program. Improvement is finished in my private capability and carry no affiliation to my work.

Utilization

The final command line arguments required are as observe:

wodat.exe COMMAND ARGGUMENTS
COMMAND (ALL,BRUTECRED,BRUTESID,BRUTESRV,TEST,DISC)
-server:XXX.XXX.XXX.XXX -port:1520
-sid:AS OR -srv:AS
-user:Peter -pass:Password

To check if a particular credential set works.

wodat.exe TEST -server:XXX.XXX.XXX.XXX -port:1521 -sid:XE -user:peter -pass:pan

See the define on modules for additional utilization. The software will at all times first verify if the TNS listener that’s focused works.

Modules

BRUTESID

Module performs wordlist SID guessing assault if not profitable will ask for brute power assault.

wodat.exe BRUTESID -server:XXX.XXX.XXX.XXX -port:1521

BRUTESRV

Module performs wordlist ServiceName guessing assault if not profitable will ask for brute power assault.

wodat.exe BRUTESRV -server:XXX.XXX.XXX.XXX -port:1521

BRUTECRED

Module performs wordlist password based mostly assault. The next choices exist:

A - username:password combolist with no credentials given throughout arguments
B - username listing with password given in arguments
C - password listing with username given in arguments
D - username as password with username listing supplied

To carry out a fundamental assault with a given file that has username:password combos.

wodat.exe BRUTECRED -server:XXX.XXX.XXX.XXX -port:1521 -sid:XE

TEST

Module assessments if the given connection string can join efficiently.

wodat.exe TEST -server:XXX.XXX.XXX.XXX -port:1521 -sid:XE -user:peter -pass:pan

DISC

Module will carry out discovery towards supplied CIDR vary or file with cases. Notice, solely cases with legitimate TNS listeners shall be returned. Testing a community vary shall be a lot sooner because it’s processed in parallel.

Situations to check should be formatted as per the beneath instance targets.txt:

192.168.10.1
192.168.10.5,1521

ALL

Not applied but.

RECON

Not applied but.

Setup and Necessities

You may seize automated launch construct from the GitHub Actions or construct your self utilizing the next instructions:

nuget restore wodat.sln
msbuild wodat.sln -t:rebuild -property:Configuration=Launch

Some basic notes: The Oracle.ManagedDataAccess.dll library should be copied with the binary. I am methods of embedding it.

Todo

  • Deal with SYSDBA and SYSOPER connections
  • Implement excellent modules
  • Numerous validation, error dealing with code nonetheless must be executed
  • Some minor recognized bugfixes
  • Add choices to verify towards in-built lists for SID, ServiceNames or widespread credentials



RELATED ARTICLES

LEAVE A REPLY

Please enter your comment!
Please enter your name here

- Advertisment -
Google search engine

Most Popular

Recent Comments