updated to use report_auth_info() since the sid is need to authenticate.
git-svn-id: file:///home/svn/framework3/trunk@9047 4d416f70-5f16-0410-b530-b9f4589650daunstable
parent
ba7b0e7cba
commit
a3e92b2e75
|
@ -9,9 +9,9 @@ require 'msf/core'
|
||||||
|
|
||||||
class Metasploit3 < Msf::Auxiliary
|
class Metasploit3 < Msf::Auxiliary
|
||||||
|
|
||||||
|
include Msf::Exploit::Remote::TNS
|
||||||
include Msf::Auxiliary::Report
|
include Msf::Auxiliary::Report
|
||||||
include Msf::Auxiliary::Scanner
|
include Msf::Auxiliary::Scanner
|
||||||
include Msf::Exploit::Remote::TNS
|
|
||||||
|
|
||||||
def initialize(info = {})
|
def initialize(info = {})
|
||||||
super(update_info(info,
|
super(update_info(info,
|
||||||
|
@ -21,7 +21,7 @@ class Metasploit3 < Msf::Auxiliary
|
||||||
With Oracle 9.2.0.8 and above the listener will be protected and
|
With Oracle 9.2.0.8 and above the listener will be protected and
|
||||||
the SID will have to be bruteforced or guessed.
|
the SID will have to be bruteforced or guessed.
|
||||||
},
|
},
|
||||||
'Author' => ['CG'],
|
'Author' => [ 'CG', 'MC' ],
|
||||||
'License' => MSF_LICENSE,
|
'License' => MSF_LICENSE,
|
||||||
'Version' => '$Revision$',
|
'Version' => '$Revision$',
|
||||||
'DisclosureDate' => 'Jan 7 2009'))
|
'DisclosureDate' => 'Jan 7 2009'))
|
||||||
|
@ -51,22 +51,22 @@ class Metasploit3 < Msf::Auxiliary
|
||||||
else
|
else
|
||||||
sid = data.scan(/INSTANCE_NAME=([^\)]+)/)
|
sid = data.scan(/INSTANCE_NAME=([^\)]+)/)
|
||||||
sid.uniq.each do |s|
|
sid.uniq.each do |s|
|
||||||
report_note(
|
report_auth_info(
|
||||||
:host => ip,
|
:host => ip,
|
||||||
:proto => 'tcp',
|
:proto => 'tcp',
|
||||||
:port => datastore['RPORT'],
|
:port => rport,
|
||||||
:type => 'INSTANCE_NAME',
|
:type => "oracle_instance_name",
|
||||||
:data => "#{s}"
|
:data => "#{s}"
|
||||||
)
|
)
|
||||||
print_status("Identified SID for #{ip}: #{s}")
|
print_status("Identified SID for #{ip}: #{s}")
|
||||||
end
|
end
|
||||||
service_name = data.scan(/SERVICE_NAME=([^\)]+)/)
|
service_name = data.scan(/SERVICE_NAME=([^\)]+)/)
|
||||||
service_name.each do |s|
|
service_name.uniq.each do |s|
|
||||||
report_note(
|
report_auth_info(
|
||||||
:host => ip,
|
:host => ip,
|
||||||
:proto => 'tcp',
|
:proto => 'tcp',
|
||||||
:port => datastore['RPORT'],
|
:port => rport,
|
||||||
:type => 'SERVICE_NAME',
|
:type => "oracle_service_name",
|
||||||
:data => "#{s}"
|
:data => "#{s}"
|
||||||
)
|
)
|
||||||
print_status("Identified SERVICE_NAME for #{ip}: #{s}")
|
print_status("Identified SERVICE_NAME for #{ip}: #{s}")
|
||||||
|
|
Loading…
Reference in New Issue