Brute forcing Oracle SID names
Oracle SID names are used to identify database instances. The TNS listener service can be abused to find valid SID names. If the SID name is known, dictionary attacks can be performed to attempt to guess valid credentials.
This recipe shows how to brute-force Oracle SID names with Nmap.
How to do it...
To brute-force Oracle SID names, use the following Nmap command:
$ nmap -sV --script oracle-sid-brute <target>
All the SID names found will be included in the NSE script output section for the oracle-sid-brute
script:
PORT STATE SERVICE REASON 1521/tcp open oracle syn-ack | oracle-sid-brute: | orcl | prod |_ devel
How it works...
The -sV --script oracle-sid-brute
options tell Nmap to initiate service detection (-sV
) and use the oracle-sid-brute
NSE script. The oracle-sid-brute
NSE script was submitted by...