OAT – Oracle Auditing Tools For Database Security


Oracle Auditing Tools is a tool kit that could be used to audit security within Oracle database servers.

OAT uses CREATE LIBRARY to be able to access the WinExec function in the kernel32.dll in Windows or the system call in libc on Un*x. Having access to this function makes it possible to execute anything on the server with the same security context as the user who started the Oracle Service. So basically all accounts with default passwords, or easy guessable password, having this privilege can do this.

Oracle Database Security

OAT has a builtin TFTP server for making file transfers easy. The Tools are Java based and were tested on both Windows and Linux. They should hopefully also run on any other Java platform.

We don’t write about many Oracle tools as they tend to be a bit ‘Enterprise’ but we did cover ODAT and way before that OAPScan:

ODAT (Oracle Database Attacking Tool) – Test Oracle Database Security
OAPScan – Oracle Application Server Scanner

Contains

  • OraclePWGuess – A dictionary attack tool that can be used with user supplied dictionaries or with the builtin support for finding default accounts.
  • OracleQuery– A minimalistic command line based sql query tool.
  • OracleSamDump – Connects to the Oracle server and executes TFTP get, to fetch the pwdump2 binary. The server is then pwdump2:ed and the result is returned to the SAM folder of the TFTP server.
  • OracleSysExec – Can be run in interactive mode, letting the user specify commands to be executed by the server or in automatic mode. In automatic mode, netcat is tftpd over to the server and binds a shell to the tcp port 31337.
  • OracleTNSCtrl – is used to query the TNS listener for various information, like the Oracle lsnrctl utility. It is somewhat limited though. Use the help command to see commands curently implemented.

Requirements

– Java Runtime Environment
– Oracle JDBC Driver (classes111.zip or classes12.zip)

You can download OAT here:

Version 1.3.1 source oat-source-1.3.1.zip
Version 1.3.1 binary oat-binary-1.3.1.zip

Or read more here.

Posted in: Database Hacking, Hacking Tools

,


Latest Posts:


Socialscan - Command-Line Tool To Check For Email And Social Media Username Usage Socialscan – Command-Line Tool To Check For Email And Social Media Username Usage
socialscan is an accurate command-line tool to check For email and social media username usage on online platforms, given an email address or username,
CFRipper - CloudFormation Security Scanning & Audit Tool CFRipper – CloudFormation Security Scanning & Audit Tool
CFRipper is a Python-based Library and CLI security analyzer that functions as an AWS CloudFormation security scanning and audit tool
CredNinja - Test Credential Validity of Dumped Credentials or Hashes CredNinja – Test Credential Validity of Dumped Credentials or Hashes
CredNinja is a tool to quickly test credential validity of dumped credentials (or hashes) across an entire network or domain very efficiently.
assetfinder - Find Related Domains and Subdomains assetfinder – Find Related Domains and Subdomains
assetfinder is a Go-based tool to find related domains and subdomains that are related to a given domain from a variety of sources including Facebook and more.
Karkinos - Beginner Friendly Penetration Testing Tool Karkinos – Beginner Friendly Penetration Testing Tool
Karkinos is a light-weight Beginner Friendly Penetration Testing Tool, which is basically a 'Swiss Army Knife' for pen-testing and/or hacking CTF's.
Aclpwn.Py - Exploit ACL Based Privilege Escalation Paths in Active Directory Aclpwn.Py – Exploit ACL Based Privilege Escalation Paths in Active Directory
Aclpwn.py is a tool that interacts with BloodHound< to identify and exploit ACL based privilege escalation paths.


Comments are closed.