<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://lms.onnocenter.or.id/wiki/index.php?action=history&amp;feed=atom&amp;title=Pentest%3A_Discovery_Oracle_Account</id>
	<title>Pentest: Discovery Oracle Account - Revision history</title>
	<link rel="self" type="application/atom+xml" href="https://lms.onnocenter.or.id/wiki/index.php?action=history&amp;feed=atom&amp;title=Pentest%3A_Discovery_Oracle_Account"/>
	<link rel="alternate" type="text/html" href="https://lms.onnocenter.or.id/wiki/index.php?title=Pentest:_Discovery_Oracle_Account&amp;action=history"/>
	<updated>2026-04-20T09:12:12Z</updated>
	<subtitle>Revision history for this page on the wiki</subtitle>
	<generator>MediaWiki 1.45.1</generator>
	<entry>
		<id>https://lms.onnocenter.or.id/wiki/index.php?title=Pentest:_Discovery_Oracle_Account&amp;diff=50043&amp;oldid=prev</id>
		<title>Onnowpurbo: Created page with &quot;sumber: https://pentestlab.blog/2013/03/10/discovering-oracle-accounts-with-nmap/     Discovering Oracle Accounts With Nmap  March 10, 2013  netbiosX	Information Gathering	Ora...&quot;</title>
		<link rel="alternate" type="text/html" href="https://lms.onnocenter.or.id/wiki/index.php?title=Pentest:_Discovery_Oracle_Account&amp;diff=50043&amp;oldid=prev"/>
		<updated>2018-01-22T02:35:14Z</updated>

		<summary type="html">&lt;p&gt;Created page with &amp;quot;sumber: https://pentestlab.blog/2013/03/10/discovering-oracle-accounts-with-nmap/     Discovering Oracle Accounts With Nmap  March 10, 2013  netbiosX	Information Gathering	Ora...&amp;quot;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;sumber: https://pentestlab.blog/2013/03/10/discovering-oracle-accounts-with-nmap/&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 Discovering Oracle Accounts With Nmap&lt;br /&gt;
&lt;br /&gt;
March 10, 2013&lt;br /&gt;
&lt;br /&gt;
netbiosX	Information Gathering	Oracle, oracle accounts, oracle-brute, oracle-sid-brute, penetration test, SID	2 Comments	&lt;br /&gt;
&lt;br /&gt;
If we are conducting an infrastructure penetration test and we have discover an Oracle database during the information gathering stage then we can use Nmap to perform some checks that will help us to obtain potentially the accounts that exists on the database. These checks can be executed with two scripts that Nmap contains in his scripting engine.Specifically the scripts that we will need to use are the following:&lt;br /&gt;
&lt;br /&gt;
    oracle-sid-brute&lt;br /&gt;
    oracle-brute&lt;br /&gt;
&lt;br /&gt;
Oracle databases are running on port 1521 so in most of the cases we can identify them just by checking if this port is open on our target host.The next step is to use the script oracle-sid-brute which will try to brute force common oracle SID’s.The next image is showing the use of this script and that has successfully identified that the SID is XE.&lt;br /&gt;
Brute Forcing Oracle SID&amp;#039;s - Nmap&lt;br /&gt;
&lt;br /&gt;
Brute Forcing Oracle SID’s – Nmap&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
Now that we know the SID of the Oracle database we can use the oracle-brute script to discover the valid accounts.by specifying the SID name&lt;br /&gt;
Discovering Oracle Accounts&lt;br /&gt;
&lt;br /&gt;
Discovering Oracle Accounts&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
Conclusion&lt;br /&gt;
&lt;br /&gt;
With these two scripts we can perform security audits against an Oracle database with Nmap.However the drawback as the above image indicates is that we can lock the accounts as the script doesn’t have a check about the number of tries that will execute in order to prevent the account lockout.From the other hand it is a very fast approach for detecting oracle accounts through Nmap during the information gathering.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Referensi==&lt;br /&gt;
&lt;br /&gt;
* https://pentestlab.blog/2013/03/10/discovering-oracle-accounts-with-nmap/&lt;/div&gt;</summary>
		<author><name>Onnowpurbo</name></author>
	</entry>
</feed>