SIDGuesser
SIDGuesser is as the name implies a small command-line based tool that
tries to guess instance names for an Oracle database given a user
supplied dictionary. The speed of the tool is relatively slow
(80-100 guesses per second) but it does the job.
Why do we need it?
The trouble with Oracle 10g and above is that the TNS Listener has a
number of extra security features applied that precludes it giving away
certain status and service information, (unlike Oracle 9i which gave
away everything ;-) ). The database enumeration tools oscanner and oat generally rely
on interrogating the Oracle TNS listener to pick up the database SID and
with this information they then can perform a brute force/ dictionary
based check of Oracle default user accounts and accounts with the same
username as password etc.
Generally with 10g these 2 tools do not work unless a SID can be
enumerated, in addition the oscanner tool cannot have a SID manually
assigned leaving it pretty pointless for 10g usage! This new tool, which
when tried against both Oracle 9 and 10 did pick up the database SID's.
This information can then be supplied to opwg tool in the oat suite by
means of the -d option and a breakout/check of user accounts will begin.
It is available from here.
Installation:
To install simply download and create your own custom word file of
common database names.
Usage:
C:\Documents and Settings\hacker
\Desktop\sid>SIDGuesser.exe
SIDGuesser v1.0.5 by patrik@cqure.net
-------------------------------------
SIDGuesser.exe -i <ip> -d <dictionary>
[options]
options:
-p
<portnr> Use specific port (default 1521)
-r <report> Report to file
-m <mode> findfirst OR findall(default)
Expected Output:
Oracle 10g test:
C:\Documents and Settings\hacker
\Desktop\sid>SIDGuesser.exe -i 192.168.0.223 -d words.txt
SIDGuesser v1.0.5 by patrik@cqure.net
-------------------------------------
Starting Dictionary Attack (<space>
for stats, Q for quit) ...
FOUND SID: test
Oracle 9i test:
If you choose to save it to a file i.e. C:\Documents and
Settings\hacker\Desktop\sid>SIDGuesser.exe -i 192.168.0.67 -d words.txt -r results.txt, the contents of the file will look like:
SIDGuesser v1.0.5 by patrik@cqure.net
-------------------------------------
FOUND SID: DOCSDATA
FOUND SID: plsEXTPROC
|