You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
... Hello I want to ask you question about a new idea in hackthebox game , I have a Main website that website have a lot of subdomain i pentest them all and I got a lot of information about them , these severs use oracle database different types and different ports , we talk about (Oracle Application Server 10g httpd 10.1.2.0.2) (Oracle XML DB Enterprise Edition httpd) ports(5050,7778,7777) I run a lot of test in msfconsole ,odat and oscanner , i got all sids in the server but when i try to brute force the admin and password to connect to oracle data base with oracle for developer app I got the [-] According to a test, the TNS listener XXXX.XXXX.XXXX.XXXX is NOT well configured. This target is SKIPPED .... my question if you have a way to brute force the admin and password of the database to connect to the database or exploit to gain access to main database , at the same time I got username and password inside the database but i fail to upgrade the exploit with models inside odat framework ...
The text was updated successfully, but these errors were encountered:
... Hello I want to ask you question about a new idea in hackthebox game , I have a Main website that website have a lot of subdomain i pentest them all and I got a lot of information about them , these severs use oracle database different types and different ports , we talk about (Oracle Application Server 10g httpd 10.1.2.0.2) (Oracle XML DB Enterprise Edition httpd) ports(5050,7778,7777) I run a lot of test in msfconsole ,odat and oscanner , i got all sids in the server but when i try to brute force the admin and password to connect to oracle data base with oracle for developer app I got the [-] According to a test, the TNS listener XXXX.XXXX.XXXX.XXXX is NOT well configured. This target is SKIPPED .... my question if you have a way to brute force the admin and password of the database to connect to the database or exploit to gain access to main database , at the same time I got username and password inside the database but i fail to upgrade the exploit with models inside odat framework ...
The text was updated successfully, but these errors were encountered: