?
Solved

Using Hydra to Scan Oracle Databases

Posted on 2013-02-04
5
Medium Priority
?
655 Views
Last Modified: 2013-02-27
Hello Experts,

      For the past few weeks I have been using Hydra to scan our network for exposed SQL databases (MySQL and MSSQL) with a great deal of success. Now I need to scan for Oracle databases with weak or no password protection.  I have been doing some research and found that you need to use a module ( based on the Readme file that comes with Hydra) to run with hydra to successfully  do pen test  these type of databases… does anybody know where I can get the Oracle-listener Module to complete this task.
0
Comment
Question by:amstoots
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
  • 2
5 Comments
 
LVL 33

Accepted Solution

by:
Dave Howe earned 2000 total points
ID: 38854714
Hydra has had that module out-of-the-box since release 6.3 - however, it won't build unless you have both an Oracle client and libaio on the machine - so I would suggest installing those (you can get the oracle client from http://www.oracle.com/technetwork/topics/linuxsoft-082809.html ) and trying again?
0
 

Author Comment

by:amstoots
ID: 38933148
I've requested that this question be deleted for the following reason:

no longer needed
0
 
LVL 33

Expert Comment

by:Dave Howe
ID: 38933149
Gave answer, not sure why this is to be deleted?
0
 

Author Closing Comment

by:amstoots
ID: 38933982
Thank you ....
0

Featured Post

Get your Conversational Ransomware Defense e‑book

This e-book gives you an insight into the ransomware threat and reviews the fundamentals of top-notch ransomware preparedness and recovery. To help you protect yourself and your organization. The initial infection may be inevitable, so the best protection is to be fully prepared.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Compliance and data security require steps be taken to prevent unauthorized users from copying data.  Here's one method to prevent data theft via USB drives (and writable optical media).
Hey fellow admins! This time, I have a little fairy tale for you. As many tales do, it starts boring and then gets pretty gory. I hope you like it. TL;DR: It is about an important security matter, you should read it if you run or administer Windows …
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, just open a new email message. In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …

764 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question