Oracle TNS Enumeration

The practical way to understand how to a specific protocol works is to use it's client tools and monitor its packets.

If you take a look to pure connection of SQL*plus client to a TNS listener from Wireshark, you'll find the first connect packet as bellow

Wireshark
Figure 1. TNS Packet
  • TNS Packet Description
    Transparent Network Substrate Protocol
      Packet Length: 224
      Packet Checksum: 0x0000
      Packet Type: Connect (1) 0x01
      Reserved Byte: 00
      Header Checksum: 0x0000
      Connect
          Version: 315
          Version (Compatible): 300
          Service Options: 0x0c41
          Session Data Unit Size: 8192
          Maximum Transmission Data Unit Size: 65535
          NT Protocol Characteristics: 0x7f08
          Line Turnaround Value: 0
          Value of 1 in Hardware: 0100
          Length of Connect Data: 154
          Offset to Connect Data: 70
          Maximum Receivable Connect Data: 2048
          Connect Flags 0: 0x41
          Connect Flags 1: 0x41
          Trace Cross Facility Item 1: 0x00000000
          Trace Cross Facility Item 2: 0x00000000
          Trace Unique Connection ID: 0x0000000000000000
          Connect Data: (DESCRIPTION=(CONNECT_DATA=(SERVICE_NAME=XE)(CID=(PROGRAM=sqlplus@Archer)(HOST=Archer)(USER=KING)))(ADDRESS=(PROTOCOL=TCP)(HOST=192.168.0.13)(PORT=1521)))
    
  • TNS Packet Hexdump
    0000   08 00 27 3a fb 1d 3c 77 e6 68 66 e9 08 00 45 00  ..':..<w.hf...E.
    0010   01 14 65 4f 40 00 40 06 53 28 c0 a8 00 0f c0 a8  ..eO@[email protected](......
    0020   00 0d 81 32 05 f1 04 d7 76 08 c9 98 31 e3 80 18  ...2....v...1...
    0030   00 e5 0f 40 00 00 01 01 08 0a 0d 8a 13 4a 05 44  [email protected]
    0040   03 b3 00 e0 00 00 01 00 00 00 01 3b 01 2c 0c 41  ...........;.,.A
    0050   20 00 ff ff 7f 08 00 00 01 00 00 9a 00 46 00 00   ............F..
    0060   08 00 41 41 00 00 00 00 00 00 00 00 00 00 00 00  ..AA............
    0070   00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00  .............. .
    0080   00 20 00 00 00 00 00 00 28 44 45 53 43 52 49 50  . ......(DESCRIP
    0090   54 49 4f 4e 3d 28 43 4f 4e 4e 45 43 54 5f 44 41  TION=(CONNECT_DA
    00a0   54 41 3d 28 53 45 52 56 49 43 45 5f 4e 41 4d 45  TA=(SERVICE_NAME
    00b0   3d 58 45 29 28 43 49 44 3d 28 50 52 4f 47 52 41  =XE)(CID=(PROGRA
    00c0   4d 3d 73 71 6c 70 6c 75 73 40 41 72 63 68 65 72  M=sqlplus@Archer
    00d0   29 28 48 4f 53 54 3d 41 72 63 68 65 72 29 28 55  )(HOST=Archer)(U
    00e0   53 45 52 3d 4b 49 4e 47 29 29 29 28 41 44 44 52  SER=KING)))(ADDR
    00f0   45 53 53 3d 28 50 52 4f 54 4f 43 4f 4c 3d 54 43  ESS=(PROTOCOL=TC
    0100   50 29 28 48 4f 53 54 3d 31 39 32 2e 31 36 38 2e  P)(HOST=192.168.
    0110   30 2e 31 33 29 28 50 4f 52 54 3d 31 35 32 31 29  0.13)(PORT=1521)
    0120   29 29                                            ))
    

Now base on our understanding, let's to build an equivalent request using ruby.

  • TNS packet builder
def tns_packet(connect_data)

  #=> Transparent Network Substrate Protocol
  # Packet Length
  pkt =  [58 + connect_data.length].pack('n')
  # Packet Checksum
  pkt << "\x00\x00"
  # Packet Type: Connect(1)
  pkt << "\x01"
  # Reserved Byte
  pkt << "\x00"
  # Header Checksum
  pkt << "\x00\x00"
  #=> Connect
  # Version
  pkt << "\x01\x36"
  # Version (Compatible)
  pkt << "\x01\x2C"
  # Service Options
  pkt << "\x00\x00"
  # Session Data Unit Size
  pkt << "\x08\x00"
  # Maximum Transmission Data Unit Size
  pkt << "\xFF\xFF"
  # NT Protocol Characteristics
  pkt << "\x7F\x08"
  # Line Turnaround Value
  pkt << "\x00\x00"
  # Value of 1 in Hardware
  pkt << "\x00\x01"
  # Length of Connect Data
  pkt << [connect_data.length].pack('n')
  # Offset to Connect Data
  pkt << "\x00\x3A"
  # Maximum Receivable Connect Data
  pkt << "\x00\x00\x00\x00"
  # Connect Flags 0
  pkt << "\x00"
  # Connect Flags 1
  pkt << "\x00"
  # Trace Cross Facility Item 1
  pkt << "\x00\x00\x00\x00"
  # Trace Cross Facility Item 2
  pkt << "\x00\x00\x00\x00"
  # Trace Unique Connection ID
  pkt << "\x00\x00\x34\xE6\x00\x00\x00\x01"
  # Connect Data
  pkt << "\x00\x00\x00\x00\x00\x00\x00\x00"
  pkt << connect_data

  return pkt

end
  • SID Request

There is a data structure for interacting with the TNS which is similar to the following (DESCRIPTION=(CONNECT_DATA=(SID=#{sid})(CID=(PROGRAM=)(HOST=__jdbc__)(USER=)))(ADDRESS=(PROTOCOL=tcp)(HOST=#{host})(PORT=#{port})))

def sid_request(sid,host, port)
  connect_data = "(DESCRIPTION=(CONNECT_DATA=(SID=#{sid})(CID=(PROGRAM=)(HOST=__jdbc__)(USER=)))(ADDRESS=(PROTOCOL=tcp)(HOST=#{host})(PORT=#{port})))"
  pkt = tns_packet(connect_data)
end

Now we have everything to send our packet, let's to build a simple tns brute force to enumerate the exist tns listeners. The default behavior for oracle 11g is to reply with nothing if listener exist, and reply with error if it doesn't, the error similar to this g"[(DESCRIPTION=(TMP=)(VSNNUM=186647040)(ERR=12505)(ERROR_STACK=(ERROR=(CODE=12505)(EMFI=4)))).

Let's to warp everything together by build a SID brute force script

0.1. SID Brute Force

tns_brute.rb

#!/usr/bin/env ruby
# -*- coding: binary -*-
require 'socket'

if ARGV.size < 1
  puts "Usage:\n#{__FILE__} <IP ADDRESS> [PORT]"
  exit 0
else
  host = ARGV[0]
  port = ARGV[1] || 1521
end
sid  = ARGV[2] || 'PLSExtProc'

#
# Build TNS Packet
#
def tns_packet(connect_data)

  #=> Transparent Network Substrate Protocol
  # Packet Length
  pkt =  [58 + connect_data.length].pack('n')
  # Packet Checksum
  pkt << "\x00\x00"
  # Packet Type: Connect(1)
  pkt << "\x01"
  # Reserved Byte
  pkt << "\x00"
  # Header Checksum
  pkt << "\x00\x00"
  #=> Connect
  # Version
  pkt << "\x01\x36"
  # Version (Compatible)
  pkt << "\x01\x2C"
  # Service Options
  pkt << "\x00\x00"
  # Session Data Unit Size
  pkt << "\x08\x00"
  # Maximum Transmission Data Unit Size
  pkt << "\xFF\xFF"
  # NT Protocol Characteristics
  pkt << "\x7F\x08"
  # Line Turnaround Value
  pkt << "\x00\x00"
  # Value of 1 in Hardware
  pkt << "\x00\x01"
  # Length of Connect Data
  pkt << [connect_data.length].pack('n')
  # Offset to Connect Data
  pkt << "\x00\x3A"
  # Maximum Receivable Connect Data
  pkt << "\x00\x00\x00\x00"
  # Connect Flags 0
  pkt << "\x00"
  # Connect Flags 1
  pkt << "\x00"
  # Trace Cross Facility Item 1
  pkt << "\x00\x00\x00\x00"
  # Trace Cross Facility Item 2
  pkt << "\x00\x00\x00\x00"
  # Trace Unique Connection ID
  pkt << "\x00\x00\x34\xE6\x00\x00\x00\x01"
  # Connect Data
  pkt << "\x00\x00\x00\x00\x00\x00\x00\x00"
  pkt << connect_data

  return pkt

end

#
# SID Request Data
#
def sid_request(sid,host, port)
  connect_data = "(DESCRIPTION=(CONNECT_DATA=(SID=#{sid})(CID=(PROGRAM=)(HOST=__jdbc__)(USER=)))(ADDRESS=(PROTOCOL=tcp)(HOST=#{host})(PORT=#{port})))"
  pkt = tns_packet(connect_data)
end


sids = [ 'N00TEXIST', 'PLSExtProc', 'ORACLE', 'ORA', 'ORA1', 'ORA2', 'XE', 'SOA', 'SOA1', 'SOA2', 'DBA1', 'DBA2' 'HR', 'HR1', 'HR2','SAP', 'TEST']

sids.each do |sid|
  s = TCPSocket.new host, port.to_i
  s.send sid_request(sid, host, port), 0
  response = s.recv(1000)
  puts "[+] Found SID: " + sid if response.scan(/ERROR/).empty?
#   puts "[+] No SID: " + sid , response unless response.scan(/ERROR/).empty?
  s.close
end

Run it

ruby tns_brute.rb 192.168.0.13 1521

[+] Found SID: PLSExtProc
[+] Found SID: XE

Notes:

  • This script will work on Oracle 11g and before
  • Notice # -*- coding: binary -*- at the top of the script because we are working on pure binary data that may not mean anything to the language.

1.

results matching ""

    No results matching ""