Oracle Auditing Tools is a tool kit that could be used to audit security within Oracle database servers.
OAT uses CREATE LIBRARY to be able to access the WinExec function in the kernel32.dll in Windows or the system call in libc on Un*x. Having access to this function makes it possible to execute anything on the server with the same security context as the user who started the Oracle Service. So basically all accounts with default passwords, or easy guessable password, having this privilege can do this.
OAT has a builtin TFTP server for making file transfers easy. The Tools are Java based and were tested on both Windows and Linux. They should hopefully also run on any other Java platform.
We don’t write about many Oracle tools as they tend to be a bit ‘Enterprise’ but we did cover ODAT and way before that OAPScan:
– ODAT (Oracle Database Attacking Tool) – Test Oracle Database Security
– OAPScan – Oracle Application Server Scanner
Contains
- OraclePWGuess – A dictionary attack tool that can be used with user supplied dictionaries or with the builtin support for finding default accounts.
- OracleQuery– A minimalistic command line based sql query tool.
- OracleSamDump – Connects to the Oracle server and executes TFTP get, to fetch the pwdump2 binary. The server is then pwdump2:ed and the result is returned to the SAM folder of the TFTP server.
- OracleSysExec – Can be run in interactive mode, letting the user specify commands to be executed by the server or in automatic mode. In automatic mode, netcat is tftpd over to the server and binds a shell to the tcp port 31337.
- OracleTNSCtrl – is used to query the TNS listener for various information, like the Oracle lsnrctl utility. It is somewhat limited though. Use the help command to see commands curently implemented.
Requirements
– Java Runtime Environment
– Oracle JDBC Driver (classes111.zip or classes12.zip)
You can download OAT here:
Version 1.3.1 source oat-source-1.3.1.zip
Version 1.3.1 binary oat-binary-1.3.1.zip
Or read more here.