Fix links in Pentesting Oracle Listener

This commit is contained in:
sawatdee 2021-08-28 16:17:15 +07:00 committed by GitHub
parent 2782c35936
commit 9255488319
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23

View File

@ -19,7 +19,7 @@ When enumerating Oracle the first step is to talk to the TNS-Listener that usual
4. **Bruteforce credentials** for valid SID name discovered
5. Try to **execute code**
In order to user MSF oracle modules you need to install some dependencies: **\*\*\[**Installation_\*\]\(oracle-pentesting-requirements-installation.md\)\_\*\*\*
In order to user MSF oracle modules you need to install some dependencies: [**Installation**](oracle-pentesting-requirements-installation.md)
## Enumeration
@ -120,7 +120,7 @@ Below are some of the default passwords associated with Oracle:
Other **default passwords** can be found [here ](http://www.petefinnigan.com/default/oracle_default_passwords.htm)and [here](https://cirt.net/passwords?vendor=Oracle).
The versions 11.1.0.6, 11.1.0.7, 11.2.0.1, 11.2.0.2, and 11.2.0.3 are vulnerable to **offline brute force**. **\*\*\[**Read more about this technique here._\*\]\(remote-stealth-pass-brute-force.md\)\_\*\*\*
The versions 11.1.0.6, 11.1.0.7, 11.2.0.1, 11.2.0.2, and 11.2.0.3 are vulnerable to **offline brute force**. [**Read more about this technique here.**](remote-stealth-pass-brute-force.md)
### User/Pass bruteforce