Wodat - Windows Oracle Database Attack Toolkit
Simple port of the popular Oracle Database Attack Tool (ODAT) (https://github.com/quentinhardy/odat) to C# .Net Framework. Credit to https://github.com/quentinhardy/odat as lots of the functionality are ported from his code. Perform password based attacks e.g. username as password, username list against given password, password list against given username, username:pass combolist. Test if a credential/connection string is working against target Brute force attacks to discover valid SID/ServiceNames Perform discovery of valid TNS listeners against provided target file or CIDR range More to come, I hope! Disclaimer I take not responsibility for your use of the software. Development is done in my personal capacity and carry no affiliation to my work. Usage The general command line arguments required are as follow: wodat.exe COMMAND ARGGUMENTS COMMAND (ALL,BRUTECRED,BRUTESID,BRUTESRV,TEST,DISC) -server:XXX.XXX.XXX.XXX -port:1520 -sid:AS OR -srv:AS -user:Peter -pass:Password To test if a specific credential set works. wodat.exe TEST -server:XXX.XXX.XXX.XXX -port:1521 -sid:XE -user:peter -pass:pan See the outline on modules for further usage. The tool will always first check if the TNS listener that is targeted works. Modules BRUTESID Module performs wordlist SID guessing attack if not successful will ask for brute force attack. wodat.exe BRUTESID -server:XXX.XXX.XXX.XXX -port:1521 BRUTESRV Module performs wordlist ServiceName guessing attack if not successful will ask for brute force attack. wodat.exe BRUTESRV -server:XXX.XXX.XXX.XXX -port:1521 BRUTECRED Module performs wordlist password based attack. The following options exist: A - username:password combolist with no credentials given during argumentsB - username list with password given in argumentsC - password list with username given in argumentsD - username as password with username list provided To perform a basic attack with a given file that has username:password combos. wodat.exe BRUTECRED -server:XXX.XXX.XXX.XXX -port:1521 -sid:XE TEST Module tests if the given connection string can connect successfully. wodat.exe TEST -server:XXX.XXX.XXX.XXX -port:1521 -sid:XE -user:peter -pass:pan DISC Module will perform discovery against provided CIDR range or file with instances. Note, only instances with valid TNS listeners will be returned. Testing a network range will be much faster as it’s processed in parallel. wodat.exe DISC Instances to test must be formatted as per the below example targets.txt: 192.168.10.1192.168.10.5,1521 ALL Not implemented yet. RECON Not implemented yet. Setup and Requirements You can grab automated release build from the GitHub Actions or build yourself using the following commands: nuget restore wodat.slnmsbuild wodat.sln -t:rebuild -property:Configuration=Release Some general notes: The Oracle.ManagedDataAccess.dll library will have to be copied with the binary. I'm looking at ways of embedding it. Todo Handle SYSDBA and SYSOPER connections Implement outstanding modules Various validation, error handling code still needs to be done Some minor known bugfixes Add options to check against built in lists for SID, ServiceNames or common credentials Download Wodat
Simple port of the popular Oracle Database Attack Tool (ODAT) (https://github.com/quentinhardy/odat) to C# .Net Framework. Credit to https://github.com/quentinhardy/odat as lots of the functionality are ported from his code.
- Perform password based attacks e.g. username as password, username list against given password, password list against given username, username:pass combolist.
- Test if a credential/connection string is working against target
- Brute force attacks to discover valid SID/ServiceNames
- Perform discovery of valid TNS listeners against provided target file or CIDR range
- More to come, I hope!
Disclaimer
I take not responsibility for your use of the software. Development is done in my personal capacity and carry no affiliation to my work.
Usage
The general command line arguments required are as follow:
wodat.exe COMMAND ARGGUMENTS
COMMAND (ALL,BRUTECRED,BRUTESID,BRUTESRV,TEST,DISC)
-server:XXX.XXX.XXX.XXX -port:1520
-sid:AS OR -srv:AS
-user:Peter -pass:Password
To test if a specific credential set works.
wodat.exe TEST -server:XXX.XXX.XXX.XXX -port:1521 -sid:XE -user:peter -pass:pan
See the outline on modules for further usage. The tool will always first check if the TNS listener that is targeted works.
Modules
BRUTESID
Module performs wordlist SID guessing attack if not successful will ask for brute force attack.
wodat.exe BRUTESID -server:XXX.XXX.XXX.XXX -port:1521
BRUTESRV
Module performs wordlist ServiceName guessing attack if not successful will ask for brute force attack.
wodat.exe BRUTESRV -server:XXX.XXX.XXX.XXX -port:1521
BRUTECRED
Module performs wordlist password based attack. The following options exist:
A - username:password combolist with no credentials given during arguments
B - username list with password given in arguments
C - password list with username given in arguments
D - username as password with username list provided
To perform a basic attack with a given file that has username:password combos.
wodat.exe BRUTECRED -server:XXX.XXX.XXX.XXX -port:1521 -sid:XE
TEST
Module tests if the given connection string can connect successfully.
wodat.exe TEST -server:XXX.XXX.XXX.XXX -port:1521 -sid:XE -user:peter -pass:pan
DISC
Module will perform discovery against provided CIDR range or file with instances. Note, only instances with valid TNS listeners will be returned. Testing a network range will be much faster as it’s processed in parallel.
wodat.exe DISC
Instances to test must be formatted as per the below example targets.txt
:
192.168.10.1
192.168.10.5,1521
ALL
Not implemented yet.
RECON
Not implemented yet.
Setup and Requirements
You can grab automated release build from the GitHub Actions or build yourself using the following commands:
nuget restore wodat.sln
msbuild wodat.sln -t:rebuild -property:Configuration=Release
Some general notes: The Oracle.ManagedDataAccess.dll
library will have to be copied with the binary. I'm looking at ways of embedding it.
Todo
- Handle SYSDBA and SYSOPER connections
- Implement outstanding modules
- Various validation, error handling code still needs to be done
- Some minor known bugfixes
- Add options to check against built in lists for SID, ServiceNames or common credentials