Nmap oracle-sid-brute NSE Script


This page contains detailed information about how to use the oracle-sid-brute NSE script. For list of all NSE scripts, visit the Nmap NSE Library.

Script Overview


Script source code: https://github.com/nmap/nmap/tree/master/scripts/oracle-sid-brute.nse
Script categories: intrusive, brute
Target service / protocol: oracle-tns
Target network port(s): 1521
List of CVEs: -

Script Description


The oracle-sid-brute.nse script guesses Oracle instance/SID names against the TNS-listener.

If the oraclesids script argument is not used to specify an alternate file, the default oracle-sids file will be used. License to use the oracle-sids file was granted by its author, Alexander Kornbrust (http://seclists.org/nmap-dev/2009/q4/645).

Oracle-sid-brute NSE Script Arguments


This is a full list of arguments supported by the oracle-sid-brute.nse script:

oraclesids

A file containing SIDs to try.

- - -
To use this script argument, add it to Nmap command line like in this example:

nmap --script=oracle-sid-brute --script-args oraclesids=value <target>

Oracle-sid-brute NSE Script Example Usage


Here's an example of how to use the oracle-sid-brute.nse script:

nmap --script=oracle-sid-brute --script-args=oraclesids=/path/to/sidfile -p 1521-1560 <host>

nmap --script=oracle-sid-brute -p 1521-1560 <host>

Oracle-sid-brute NSE Script Example Output


Here's a sample output from the oracle-sid-brute.nse script:

PORT     STATE SERVICE REASON
1521/tcp open  oracle  syn-ack
| oracle-sid-brute:
|   orcl
|   prod
|_  devel

Oracle-sid-brute NSE Script Example XML Output


There is no sample XML output for this module. However, by providing the -oX <file> option, Nmap will produce a XML output and save it in the file.xml file.

Author


  • Patrik Karlsson

References


See Also


Related NSE scripts to the oracle-sid-brute.nse script:

Visit Nmap NSE Library for more scripts.

Version


This page has been created based on Nmap version 7.92.