Oracle TNS Pentesting Notes
Protocol Overview
Basic Information
Protocol Features
Initial Enumeration
Port Scanning
Banner Grabbing
Anonymous/Default Access
Testing Default SIDs
Common Default SIDs
Brute Force Attacks
Using ODAT
Using Hydra
Tool Installation
Common NSE Scripts
Configuration Files
Server-side Files
Client-side Files
Example Configurations
listener.ora
tnsnames.ora
Common Vulnerabilities
Post Exploitation
Information Gathering
Privilege Escalation
Common Response Codes
Code
Meaning