From a3e92b2e75479f8028cb2a8b9f271811f249e35a Mon Sep 17 00:00:00 2001 From: Mario Ceballos Date: Sun, 11 Apr 2010 12:36:00 +0000 Subject: [PATCH] updated to use report_auth_info() since the sid is need to authenticate. git-svn-id: file:///home/svn/framework3/trunk@9047 4d416f70-5f16-0410-b530-b9f4589650da --- modules/auxiliary/scanner/oracle/sid_enum.rb | 18 +++++++++--------- 1 file changed, 9 insertions(+), 9 deletions(-) diff --git a/modules/auxiliary/scanner/oracle/sid_enum.rb b/modules/auxiliary/scanner/oracle/sid_enum.rb index 31971b80f9..70f111a556 100644 --- a/modules/auxiliary/scanner/oracle/sid_enum.rb +++ b/modules/auxiliary/scanner/oracle/sid_enum.rb @@ -9,9 +9,9 @@ require 'msf/core' class Metasploit3 < Msf::Auxiliary + include Msf::Exploit::Remote::TNS include Msf::Auxiliary::Report include Msf::Auxiliary::Scanner - include Msf::Exploit::Remote::TNS def initialize(info = {}) super(update_info(info, @@ -21,7 +21,7 @@ class Metasploit3 < Msf::Auxiliary With Oracle 9.2.0.8 and above the listener will be protected and the SID will have to be bruteforced or guessed. }, - 'Author' => ['CG'], + 'Author' => [ 'CG', 'MC' ], 'License' => MSF_LICENSE, 'Version' => '$Revision$', 'DisclosureDate' => 'Jan 7 2009')) @@ -51,22 +51,22 @@ class Metasploit3 < Msf::Auxiliary else sid = data.scan(/INSTANCE_NAME=([^\)]+)/) sid.uniq.each do |s| - report_note( + report_auth_info( :host => ip, :proto => 'tcp', - :port => datastore['RPORT'], - :type => 'INSTANCE_NAME', + :port => rport, + :type => "oracle_instance_name", :data => "#{s}" ) print_status("Identified SID for #{ip}: #{s}") end service_name = data.scan(/SERVICE_NAME=([^\)]+)/) - service_name.each do |s| - report_note( + service_name.uniq.each do |s| + report_auth_info( :host => ip, :proto => 'tcp', - :port => datastore['RPORT'], - :type => 'SERVICE_NAME', + :port => rport, + :type => "oracle_service_name", :data => "#{s}" ) print_status("Identified SERVICE_NAME for #{ip}: #{s}")