Files
metasploit-gs/modules/auxiliary/scanner/oracle/sid_enum.rb
T

78 lines
2.2 KiB
Ruby
Raw Normal View History

2009-05-01 22:02:55 +00:00
##
2017-07-24 06:26:21 -07:00
# This module requires Metasploit: https://metasploit.com/download
2013-10-15 13:50:46 -05:00
# Current source: https://github.com/rapid7/metasploit-framework
2009-05-01 22:02:55 +00:00
##
2016-03-08 14:02:44 +01:00
class MetasploitModule < Msf::Auxiliary
2013-08-30 16:28:54 -05:00
include Msf::Exploit::Remote::TNS
include Msf::Auxiliary::Report
include Msf::Auxiliary::Scanner
2009-05-01 22:02:55 +00:00
2013-08-30 16:28:54 -05:00
def initialize(info = {})
super(update_info(info,
'Name' => 'Oracle TNS Listener SID Enumeration',
'Description' => %q{
2017-08-26 21:01:10 -04:00
This module simply queries the TNS listener for the Oracle SID.
2013-08-30 16:28:54 -05:00
With Oracle 9.2.0.8 and above the listener will be protected and
the SID will have to be bruteforced or guessed.
},
'Author' => [ 'CG', 'MC' ],
'License' => MSF_LICENSE,
'DisclosureDate' => 'Jan 7 2009'
))
2009-05-01 22:02:55 +00:00
2013-08-30 16:28:54 -05:00
register_options(
[
Opt::RPORT(1521)
])
2013-08-30 16:28:54 -05:00
end
2009-05-01 22:02:55 +00:00
2013-08-30 16:28:54 -05:00
def run_host(ip)
begin
connect
2009-05-01 22:02:55 +00:00
2013-08-30 16:28:54 -05:00
pkt = tns_packet("(CONNECT_DATA=(COMMAND=STATUS))")
2009-05-01 22:02:55 +00:00
2013-08-30 16:28:54 -05:00
sock.put(pkt)
2013-08-30 16:28:54 -05:00
select(nil,nil,nil,0.5)
2009-05-01 22:02:55 +00:00
2013-08-30 16:28:54 -05:00
data = sock.get_once
2009-05-01 22:02:55 +00:00
2013-08-30 16:28:54 -05:00
if ( data and data =~ /ERROR_STACK/ )
print_error("TNS listener protected for #{ip}...")
else
if(not data)
print_error("#{ip} Connection but no data")
else
sid = data.scan(/INSTANCE_NAME=([^\)]+)/)
sid.uniq.each do |s|
report_note(
:host => ip,
:port => rport,
:type => "oracle_sid",
:data => "PORT=#{rport}, SID=#{s}",
:update => :unique_data
)
print_good("Identified SID for #{ip}:#{rport} #{s}")
end
service_name = data.scan(/SERVICE_NAME=([^\)]+)/)
service_name.uniq.each do |s|
report_note(
:host => ip,
:port => rport,
:type => "oracle_service_name",
:data => "PORT=#{rport}, SERVICE_NAME=#{s}",
:update => :unique_data
)
print_status("Identified SERVICE_NAME for #{ip}:#{rport} #{s}")
end
end
end
disconnect
rescue ::Rex::ConnectionError
rescue ::Errno::EPIPE
end
end
2009-05-01 22:02:55 +00:00
end