HTB - Silo

Silo

Getting Root:

  1. Used ODAT (Oracle Database Attacking Tool) to enumerate the Oracle database server

  2. Uploaded reverse shell with ODAT and got system

Tools Used:

odat (Oracle Database Attacking Tool)

Nmap

Enumeration

HTTP

From the headers we can see its an IIS server running version 8.5 and using ASP

Oracle

Using ODAT

ODAT: Oracle Database Attacking Tool

Finding the SID

I did this with nmap ( see Enumeration above) but it can also be done with ODAT

Brute Forcing Creds

The GitHub repo has some default username and passwords files under a directory named accounts. The default file is accounts/accounts.txt

ODAT found: scott/tiger

Because I don't know much about oracle databases, I googled the term "Kali Linux enumerate oracle databases" and I was able to find this link which shows the default usernames and passwords on oracle databases.

As you can see scott/tiger are simply default creds.

Getting a Shell

Uploading the reverse shell I created with msfvenon

Executing the file

Got a shell as SYSTEM

System Info

Last updated