Updates oracle_pwd_tools : Oracle Database 12c password brute forcer.

Change 18-06-2015:
+ added Password Decryptor; Oracle Database 12c password decryptor.
Uses data from from a successful authentication network capture and the password hash from SYS.USER$ (only first 128 characters of the T: part)

Oracle Database 12c password cracking script (Python) which uses data from a successful authentication network capture. Variables under “# Server authentication” and “# Client authentication” should be set to data from your capture. Also the passwords list should be initialized with your password dictionary entries.

Note that this script will only work for the ’12a’ protocol version which is the latest as of Oracle Database

+ pbkdf2 package (https://pypi.python.org/pypi/pbkdf2)
+ PyCrypto package (https://pypi.python.org/pypi/pycrypto/2.6.1)

Script :

( 18-06-2015)pwd_decrypt_12c.py Script :

Source : https://github.com/SpiderLabs | Our Post Before