woraauthbf woraauthbf is an oracle password brute-forcer. It has the following features: - Oracle password hash attack
- Oracle password hash attack for 11g. It tries to crack the old hash and checks the case sensitivity with the new algorithm.
- 8i authentication attack without oracle dlls
- 9i and 10g authentication attack with oracle dlls
- Dictionary attack
- Incremental brute force attack
- Multithreaded
- Resume mode
It is available from here Execution: Usage: woraauthbf.exe -p pwdfile [-d dictfile] -t type -m maxpwdlength -c charset -p Password file -d Dictionary file -t There are four possible values. "hash" and "11g10g" is for oracle password hash. "8i", "9i", "10g" are for the given authentication method. The default value is "hash". -m The maximum length of the password in brute-force mode. The maximum value is 10. The default value is 6.-c This is the charset in brute-force mode. There are three possible values: "alpha" [A-Z], "alphanum" [A-Z0-9], and all [A-Z0-9!@#$%^&*()-_+=~`[]{}|\:;"'<>,.?/]. The default value is "alpha". -s The session file contains the resume information. The programs generates two session files with name oraauth.sess.0 and oraauth.sess.1. Use the earlier one according the file access date. -o This is the path of the oran10.dll. --perm The 0 value switches off the permutation of the user names. --noarr It switches off the user names and default password checking. Password files have the following formats:
password hash: The file format is: username:password hash:sid:server: Example: SCOTT:F894844C34402B66:test:testdb: The following SQL can be used: select username||':'||password||':'||name||':'||host_name||':' from sys.dba_users, sys.V_$DATABASE, sys.v_$instance; 8i authentication The file format is: username:srvsesskey::authpasswd:clip:clp:srvip:srvp: Example: test:B18356B94CE0B21A:96D2C390490DE8BBB3A73C31077E9D79:192.168.81.3:4604:192.168.81.1:4552 9i authentication: The file format is: username:srvsesskey::autpasswd:clip:clp:srvip:srvp: Example: test1:E6873C6A656BB5C...:B850849AF89C9E3A78C6DD441...:192.168.168.2:1432:192.168.254.254:13245: 10g authentication: The file format is: username:srvsesskey:clsesskey:autpasswd:clip:clp:srvip:srvp: Example: test1:BF6325AB2B8A87638...:8D85098300E120985...:50176E4913E82EA8F...: 192.168.1.1:3332:192.168.1.2:1521: 11g password hash: The file format is: username:password hash:11g password hash:sid:server: Example: AAAA:C2977AC2A123F7BA:79FFBB4C2CC9633C5...:ORCL:ora11g: The following SQL can be used: select u.name||':'||u.password||':'||substr(u.spare4,3,63)||':'||d.name||':'|| sys_context('USERENV','SERVER_HOST')||':' from sys.user$ u, sys.V_$DATABASE d where u.type#=1; Example output: C:\woraauthbf_0.21R2>woraauthbf.exe -p has.txt -d default_passwords.txt Usernames will be permuted! The number of processors: 2 Number of pwds to check: 693 Number of pwds to check by thread: 346 Password file: hash.txt, dictionary file: default_passwords.txt, type: hash Start: 1 End: 346 Password found: SYSTEM:MANAGER2:test:testdb Start: 347 End: 693 Start array thread with 490 number of passwords! Elpased time: 0s Checked passwords: 11807
|