Skip to content

Commit b3b4384

Browse files
authored
Update README.md
1 parent 9d40453 commit b3b4384

File tree

1 file changed

+4
-5
lines changed

1 file changed

+4
-5
lines changed

README.md

Lines changed: 4 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ Usage examples of ODAT:
1616

1717
Tested on Oracle Database __10g__, __11g__, __12c__ and __18c__.
1818

19-
__ODAT linux standalone__ version at [https://github.com/quentinhardy/odat/releases/](https://github.com/quentinhardy/odat/releases/). Notice it is recommended to use the development version (*git clone*).
19+
__ODAT linux standalone__ version at [https://github.com/quentinhardy/odat/releases/](https://github.com/quentinhardy/odat/releases/). Notice it is recommended to use the development version (*git clone*), *master-python3* branch (python 3 version).
2020

2121
Changelog
2222
====
@@ -128,7 +128,7 @@ Thanks to ODAT, you can:
128128
* DBMS_ADVISOR
129129
* __delete files__ using:
130130
* UTL_FILE
131-
* __gain privileged access__ using these following system privileges combinations (see help for *privesc* module commands): (__NEW__ : 2016/02/21)
131+
* __gain privileged access__ using these following system privileges combinations (see help for *privesc* module commands):
132132
* CREATE ANY PROCEDURE
133133
* CREATE PROCEDURE and EXECUTE ANY PROCEDURE
134134
* CREATE ANY TRIGER (and CREATE PROCEDURE)
@@ -148,12 +148,11 @@ Thanks to ODAT, you can:
148148
* pickup the session key and salt for arbitrary users
149149
* attack by dictionary on sessions
150150
* the [__CVE-2012-????__](https://twitter.com/gokhanatil/status/595853921479991297): A user authenticated can modify all tables who can select even if he can't modify them normally (no ALTER privilege).
151-
* the [__CVE-2012-1675__](http://seclists.org/fulldisclosure/2012/Apr/204) (aka TNS poisoning attack) (__NEW__ : 25/03/2016)
151+
* the [__CVE-2012-1675__](http://seclists.org/fulldisclosure/2012/Apr/204) (aka TNS poisoning attack)
152152
* __search in column names__ thanks to the *search* module:
153153
* search a pattern (ex: password) in column names
154154
* __unwrap__ PL/SQL source code (10g/11g and 12c)
155-
* get __system privileges__ and __roles granted__. It is possible to get privileges and roles of roles granted also (__NEW__ : 21/02/2016)
156-
155+
* get __system privileges__ and __roles granted__. It is possible to get privileges and roles of roles granted also
157156
![Alt text](./pictures/ODAT_main_features_v2.0.jpg)
158157

159158
Supported Platforms and dependencies

0 commit comments

Comments
 (0)