[TOOL] THC-Orakel - Cracking Oracle Passwords Within Seconds
- From: SecuriTeam <support@xxxxxxxxxxxxxx>
- Date: 3 Jun 2007 18:14:40 +0200
The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com
- - promotion
The SecuriTeam alerts list - Free, Accurate, Independent.
Get your security news from a reliable source.
- - - - - - - - -
THC-Orakel - Cracking Oracle Passwords Within Seconds
THC presents a crypto <http://www.thc.org/thc-orakel> paper analyzing the
database authentication mechanism used by oracle. THC further releases
practical tools to sniff and crack the password of an oracle database
One of the network authentication modes used by Oracle databases uses a
weak key exchange mechanism. This mechanism is still used on the newest
database versions using Oracle's JAVA drivers. Also, for native Oracle
drivers an attack is known to downgrade the authentication mode to the
vulnerable version. The orakelsniffert article documents the mechanism
used by the weak authentication mode, the complexity and impact of the
attack and an example of an attack in the field. A Windows based cracker
and a simple JAVA based client application are included to verify the
results. Also, a supporting crypto utility is released.
The information has been provided by <mailto:rm@xxxxxxxxxx> vonjeek.
To keep updated with the tool visit the project's homepage at:
This bulletin is sent to members of the SecuriTeam mailing list.
To unsubscribe from the list, send mail with an empty subject line and body to: list-unsubscribe@xxxxxxxxxxxxxx
In order to subscribe to the mailing list, simply forward this email to: list-subscribe@xxxxxxxxxxxxxx
The information in this bulletin is provided "AS IS" without warranty of any kind.
In no event shall we be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages.
- Prev by Date: [EXPL] Invision Power Board Cross Site Scripting Vulnerability
- Next by Date: [NEWS] Unpatched Input Validation Flaw in Firefox (Directory Traversal)
- Previous by thread: [EXPL] Invision Power Board Cross Site Scripting Vulnerability
- Next by thread: [NEWS] Unpatched Input Validation Flaw in Firefox (Directory Traversal)