Nmap lit up the scan results: a reachable Oracle listener, and deeper inside, a fingerprint pointing to sqlplus. That single line in the output changes the entire equation. Exposed database services are one of the cleanest entry points for attackers, and Nmap paired with sqlplus is how many find them.
Nmap is the reconnaissance workhorse. Run with -sV, it identifies services and their versions. Against Oracle ports (default: 1521), it often extracts enough detail to confirm that sqlplus will connect. Once confirmed, sqlplus becomes the direct interface to the Oracle database, issuing SQL queries, running procedures, and, if credentials are weak or leaked, taking full control.
A typical workflow starts with:
nmap -p 1521 -sV --script oracle-tns-version <target>
This tells you if Oracle is there and where to aim sqlplus. With: