Call: +44 (0)7759 277220 Call

Pete Finnigan's Oracle Security Weblog

This is the weblog for Pete Finnigan. Pete works in the area of Oracle security and he specialises in auditing Oracle databases for security issues. This weblog is aimed squarely at those interested in the security of their Oracle databases.

[Previous entry: "Howard's DORIS script is available again - some security comments from me"] [Next entry: "Read only Tables or Read only users"]

Oracle Authentication Process and password algorithm

I found a useful paper on a site a few weeks ago when looking for new sources of Oracle default passwords as this paper had a link to my Oracle default password list in it. The upshot is I made a note of it and to talk about it here and today I noticed Paul had also found it. smile

The paper is titled Oracle Authentication and it includes a detailed discussion of the Oracle password algortithm including an implementation in python. I am not sure how fast that would be (haven't tested it against tools such as woraauthbf which is written in C and includes the source code and is extremely fast. A new version on woraauthbf is due out soon with some new features, I have been testing it for Laszlo, watch this space for an announcement of when its available.

Back to the paper; this paper explains the algorithm and also delves into the TNS packets that are sent to the server as part of the O3Logon process. The paper concludes with some details of attacks against the protocol including version divulgeing and also user enumeration.

I have talked here about the 11g password algorithm, including a simple PL/SQL script that implements the 11g password algorithm and also a discussion of weaknesses in the 11g password algorithm. There are plenty more discussions here around the Oracle password algorithm, use a simple query on google for Oracle password algorithm to locate some of them.