Solved

Using Hydra to Scan Oracle Databases

Posted on 2013-02-04
5
628 Views
Last Modified: 2013-02-27
Hello Experts,

      For the past few weeks I have been using Hydra to scan our network for exposed SQL databases (MySQL and MSSQL) with a great deal of success. Now I need to scan for Oracle databases with weak or no password protection.  I have been doing some research and found that you need to use a module ( based on the Readme file that comes with Hydra) to run with hydra to successfully  do pen test  these type of databases… does anybody know where I can get the Oracle-listener Module to complete this task.
0
Comment
Question by:amstoots
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
  • 2
5 Comments
 
LVL 33

Accepted Solution

by:
Dave Howe earned 500 total points
ID: 38854714
Hydra has had that module out-of-the-box since release 6.3 - however, it won't build unless you have both an Oracle client and libaio on the machine - so I would suggest installing those (you can get the oracle client from http://www.oracle.com/technetwork/topics/linuxsoft-082809.html ) and trying again?
0
 

Author Comment

by:amstoots
ID: 38933148
I've requested that this question be deleted for the following reason:

no longer needed
0
 
LVL 33

Expert Comment

by:Dave Howe
ID: 38933149
Gave answer, not sure why this is to be deleted?
0
 

Author Closing Comment

by:amstoots
ID: 38933982
Thank you ....
0

Featured Post

Ransomware: The New Cyber Threat & How to Stop It

This infographic explains ransomware, type of malware that blocks access to your files or your systems and holds them hostage until a ransom is paid. It also examines the different types of ransomware and explains what you can do to thwart this sinister online threat.  

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Recovering from what the press called "the largest-ever cyber-attack", IT departments worldwide are discussing ways to defend against this in the future. In this process, many people are looking for immediate actions while, instead, they need to tho…
The conference as a whole was very interesting, although if one has to make a choice between this one and some others, you may want to check out the others.  This conference is aimed mainly at government agencies.  So it addresses the various compli…
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…

707 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question