Wodat | Windows Oracle Database Attack Toolkit

  • Search zippyshare.cloud on google and enjoy unlimited cloud storage
  • You Must Read our New Rules and Guidelines (HERE)

Ruchika oberoi

Administrator
Staff member
Mar 27, 2022
4,661
237
63
093402f52f8ead73370fc086b3169a550ce8d425

Windows Oracle Database Attack Tool



Simple port of the popular Oracle Database Attack Tool (ODAT) ( ) to C# .Net Framework. Credit to as lots of the functionality are ported from his code.

  • Perform password based attacks e.g. username as password, username list against given password, password list against given username, username:pass combolist.
  • Test if a credential/connection string is working against target
  • Brute force attacks to discover valid SID/ServiceNames
  • Perform discovery of valid TNS listeners against provided target file or CIDR range
  • More to come, I hope!
180816033 31dbc5d5 0012 401a 9748 48df230b0fdf 1

Disclaimer​

I take not responsibility for your use of the software. Development is done in my personal capacity and carry no affiliation to my work.

Usage​

The general command line arguments required are as follow:

wodat.exe COMMAND ARGGUMENTS
COMMAND (ALL,BRUTECRED,BRUTESID,BRUTESRV,TEST,DISC)
-server:XXX.XXX.XXX.XXX -port:1520
-sid:AS OR -srv:AS
-user:peter -pass:password


To test if a specific credential set works.

wodat.exe TEST -server:XXX.XXX.XXX.XXX -port:1521 -sid:XE -user:peter -pass:pan


See the outline on modules for further usage. The tool will always first check if the TNS listener that is targeted works.

Modules​

BRUTESID​

Module performs wordlist SID guessing attack if not successful will ask for brute force attack.

wodat.exe BRUTESID -server:XXX.XXX.XXX.XXX -port:1521

180816431 7bb82722 55cf 4233 9cca 8e809ebf5f4a

BRUTESRV​

Module performs wordlist ServiceName guessing attack if not successful will ask for brute force attack.

wodat.exe BRUTESRV -server:XXX.XXX.XXX.XXX -port:1521

BRUTECRED​

Module performs wordlist password based attack. The following options exist:

A - username:password combolist with no credentials given during arguments
B - username list with password given in arguments
C - password list with username given in arguments
D - username as password with username list provided

To perform a basic attack with a given file that has username:password combos.

wodat.exe BRUTECRED -server:XXX.XXX.XXX.XXX -port:1521 -sid:XE


180830466 3bf2f809 8373 44cc a72f bc11ad012283

TEST​

Module tests if the given connection string can connect successfully.

wodat.exe TEST -server:XXX.XXX.XXX.XXX -port:1521 -sid:XE -user:peter -pass:pan

180830998 112671d7 d747 43ba 90e9 01c615ca5248

DISC​

Module will perform discovery against provided CIDR range or file with instances. Note, only instances with valid TNS listeners will be returned. Testing a network range will be much faster as it’s processed in parallel.

wodat.exe DISC


Instances to test must be formatted as per the below example targets.txt:

192.168.10.1
192.168.10.5,1521


181905625 a2b4261c 3364 4f5d b60e dbfceaba5a65

ALL​

Not implemented yet.

RECON​

Not implemented yet.

Setup and Requirements​

You can grab automated release build from the GitHub Actions or build yourself using the following commands:

nuget restore wodat.sln
msbuild wodat.sln -t:rebuild -property:Configuration=Release


Some general notes: The Oracle.ManagedDataAccess.dll library will have to be copied with the binary. I’m looking at ways of embedding it.

Todo​

  • Handle SYSDBA and SYSOPER connections
  • Implement outstanding modules
  • Various validation, error handling code still needs to be done
  • Some minor known bugfixes
  • Add options to check against built in lists for SID, ServiceNames or common credentials

Changelog​

Version 0.1 - Base toolkit and functionality Version 0.2 - Several bugfixes, improved socket connection and added RECON module

GitHub:​

You must be registered for see images

Wodat

Windows Oracle Database Attack Toolkit. Contribute to InitRoot/wodat development by creating an account on GitHub.