---
title: "1521 - Oracle Listener"
weight: 1521-1522-1529
date: "2026-03-10T10:03:28+08:00"
lastmod: "2026-03-10T13:26:55+08:00"
---

💡 **学习提示**: 本文档介绍 **1521-1522-1529 - Oracle Listener** 的渗透测试方法，适合信息安全初学者和从业人员参考。

⚠️ **法律声明**: 本文档仅供学习和授权测试使用。未经授权的系统测试可能违反法律法规。

---

> ⚠️ **法律声明**: 本文档仅供学习和授权测试使用。未经授权的系统测试可能违反法律法规。

## 1521,1522-1529 - 渗透测试 Oracle TNS Listener

### 基本信息

Oracle database (Oracle DB) is a relational database management system (RDBMS) from the Oracle Corporation (from [here](https://www.techopedia.com/definition/8711/oracle-database)).

When enumerating Oracle the first step is to talk to the TNS-Listener that usually resides on the default port (1521/TCP, -you may also get secondary listeners on 1522–1529-).

```
1521/tcp open  oracle-tns    Oracle TNS Listener 9.2.0.1.0 (for 32-bit Windows)
1748/tcp open  oracle-tns    Oracle TNS Listener
```

### Summary

1. **Version 信息收集**: Identify version information to search for known vulnerabilities.
2. **TNS Listener Bruteforce**: Sometimes necessary to establish communication.
3. **SID Name 信息收集/Bruteforce**: Discover database names (SID).
4. **凭据 Bruteforce**: Attempt to access discovered SID.
5. **Code Execution**: Attempt to run code on the system.

In order to user MSF oracle modules you need to install some dependencies: [**Installation**](https://github.com/carlospolop/hacktricks/blob/master/network-services-pentesting/1521-1522-1529-pentesting-oracle-listener/oracle-pentesting-requirements-installation.md)

### Posts

Check these posts:

- [https://secybr.com/posts/oracle-pentesting-best-practices/](https://secybr.com/posts/oracle-pentesting-best-practices/)

### HackTricks Automatic Commands

```
Protocol_Name: Oracle    #Protocol Abbreviation if there is one.
Port_Number:  1521     #Comma separated if there is more than one.
Protocol_Description: Oracle TNS Listener         #Protocol Abbreviation Spelled out

Entry_1:
  Name: Notes
  Description: Notes for Oracle
  Note: |
    Oracle database (Oracle DB) is a relational database management system (RDBMS) from the Oracle Corporation

    #great oracle enumeration tool
    navigate to https://github.com/quentinhardy/odat/releases/
    download the latest
    tar -xvf odat-linux-libc2.12-x86_64.tar.gz
    cd odat-libc2.12-x86_64/
    ./odat-libc2.12-x86_64 all -s 10.10.10.82

    for more details check https://github.com/quentinhardy/odat/wiki

    https://book.hacktricks.wiki/en/network-services-pentesting/1521-1522-1529-pentesting-oracle-listener.html

Entry_2:
  Name: Nmap
  Description: Nmap with Oracle Scripts
  Command: nmap --script "oracle-tns-version" -p 1521 -T4 -sV {IP}
```

---

---

---

### 搜索引擎语法

#### FOFA

```bash
# FOFA 搜索语法
port="1521"
```

#### Shodan

```bash
# Shodan 搜索语法
port:1521
```

#### ZoomEye

```bash
# ZoomEye 搜索语法
port:1521
```

---

## 📖 参考资料

- [HackTricks - 1521-oracle-listener](https://book.hacktricks.wiki/en/network-services-pentesting/1521-oracle-listener.html)

