Database Assessmentoraclesiddictionarybrute-forcedatabase

SIDGuesser

SIDGuesser guesses SIDs and instances against an Oracle database using a predefined dictionary file. It performs slow but effective dictionary attacks at 80-100 guesses per second.

Description

SIDGuesser is a tool designed to guess SIDs (System Identifier) and instances against Oracle databases. It uses a dictionary file containing potential SID values to perform brute-force attacks on the target server. The tool is particularly useful for penetration testers and security researchers assessing the security of Oracle database configurations where default or predictable SIDs are in use.

Use cases include identifying weak SID configurations during vulnerability assessments of Oracle database servers. By systematically trying dictionary entries, it can discover valid SIDs without requiring advanced privileges or complex exploits. The tool supports interactive controls during the attack, such as viewing statistics with spacebar or quitting with Q.

Despite its slow speed, SIDGuesser reliably completes the job for dictionary-based guessing, making it suitable for targeted attacks rather than high-volume brute-forcing.

How It Works

SIDGuesser connects to an Oracle database server on the specified IP and port (default 1521) and attempts to guess SIDs or instances by trying entries from a provided dictionary file one by one. It operates at a rate of 80-100 guesses per second, sending requests to the Oracle TNS listener to validate each guess. Modes like 'findfirst' or 'findall' control whether it stops at the first match or continues through the dictionary. Progress stats are available interactively during execution.

Installation

bash
sudo apt install sidguesser

Flags

-i <ip>Target server IP address
-d <dictionary>Dictionary file path
-p <portnr>Use specific port (default 1521)
-r <report>Report to file
-m <mode>findfirst OR findall (default)

Examples

Attack the server at 192.168.1.205 using the specified dictionary file
sidguess -i 192.168.1.205 -d /usr/share/wordlists/metasploit/unix_users.txt
Show help and usage information
sidguess -h
Attack server using dictionary on default port 1521
sidguess -i 192.168.1.205 -d /usr/share/wordlists/metasploit/unix_users.txt -p 1521
Attack server on custom port 1522 with custom dictionary
sidguess -i 192.168.1.205 -d dict.txt -p 1522
Use findfirst mode to stop at first valid SID
sidguess -i 192.168.1.205 -d /usr/share/wordlists/metasploit/unix_users.txt -m findfirst
Run attack and save report to file
sidguess -i 192.168.1.205 -d dict.txt -r report.txt
Use findall mode with reporting to file
sidguess -i 192.168.1.205 -d /usr/share/wordlists/metasploit/unix_users.txt -m findall -r output.txt
Updated 2026-04-16kali.org ↗