SlideShare uma empresa Scribd logo
1 de 36
Baixar para ler offline
Exploiting new default accounts in SAP systems
Introduction
Something about SAP security
Unknown default accounts
Impact
Exploitation: combination with other vulnerabilities
Research
Solutions
Concluding
Agenda
Introduction
Who is ERP-SEC
• Company specialised in securing SAP systems and infrastructures
• Regular presenters on SAP Security
• Research: Reported and credited for dozens of SAP vulnerabilities
• Developer Protect4S – SAP Certified Security Analyser for SAPTM
• SAP Development Partner
• Our mission is to raise the security of mission–critical SAP platforms with minimal
impact on day–to–day business.
Who am I
• SAP Technology enthusiast
• SAP security researcher (1395)
• Co-founder ERP-SEC
• 15+ years background in SAP technology / SAP security (SAP basis)
Something about SAP
• Market leader in enterprise application software
• ~ 300.000 customers worldwide
• SAP customers include:
– 87% of the Forbes Global 2000 companies
– 98% of the 100 most valued brands
• Headquarters: Walldorf, Germany, offices in more than 130 countries
• Founded April 1, 1972
• Over 75.000 employees worldwide
• 74% of the world’s transaction revenue touches an SAP system
• Bottomline: Interesting Target!
Source: http://www.sap.com/bin/sapcom/en_us/downloadasset.2016-01-jan-26-01.SAP-Corporate-Fact-Sheet-En-20160126-pdf.bypassReg.html
Something about SAP
Switzerland – IPv4 scanning for SAProuter, SAP RFC Gateway and SAP Diag ports
Something about SAP
http://zonums.com/iptools/ipmapper.php
SAP Security
General state of SAP security
• We see more awareness at customers for SAP security but from awareness to action is
still not the default
• The bigger the company, the more SAP security they do
• Still a large part of customers lack basic security measures, especially the ones outside
the Fortune 2000
• SAP is working hard to improve security for years now. See for example the SAP
Security Baseline. Now it’s up to customers to take action…
• In 100% of our SAP Security assessments we found SAP default accounts.
SAP Security
When doing SAP Security assessments…
No need to explain: most easy way in via username & password
Who needs buffer overflows, DEP/ASLR bypass, XSS, SQLi when you have credentials
Two big attack vectors in every SAP system:
• SAP Default accounts
• SAP RFC gateway (and from there RFC pivoting …)
Owning SAP systems often comes down to getting access to credentials.
Sniff / social engineer / phish for accounts
Easiest option: Default accounts!!!
Default accounts and IoT
Default accounts - Mirai
http://www.csoonline.com/article/3126924/security/here-are-the-61-passwords-that-powered-the-mirai-iot-botnet.html
Default SAP accounts
Publically known SAP default accounts
RISK USER PASSWORD CLIENT REMARK
Very High SAP* 06071992 / PASS 001,066,etc… Hardcoded kernel user
Very High IDEADM admin
Almost all IDES
clients Only in IDES systems
Very High DDIC 19920706 000,001,… User has SAP_ALL
High CTB_ADMIN sap123 N.A. Java user
High EARLYWATCH SUPPORT 066
Has rights to get password hash for SAP*
from USR02 table and sometimes OS
execution
Medium TMSADM
PASSWORD /
$1Pawd2&
000, sometimes
copied to others
A new default password as the old one was
too well known?
Medium /
Low SAPCPIC ADMIN 000,001
Can be used for information retrieval and in
some cases for vulnerabilities where only
authentication is needed
Default SAP accounts
Accounts with a previously unknown SAP default password
Let’s meet some new default accounts*:
*The list does not include the more recent users like for example SM_<SM-SID> that are created with a custom password
CVE-2016-4033
RISK USER TYPE PASSWORD SOLMAN SATELLITE
HIGH SMD_ADMIN System init1234 X
HIGH SMD_BI_RFC System init1234 X
HIGH SMD_RFC System init1234 X
HIGH SOLMAN_ADMIN Dialog init1234 X
HIGH SOLMAN_BTC System init1234 X
HIGH SAPSUPPORT Dialog init1234 X X
HIGH SOLMAN<SID><CLNT> Dialog init1234 X
MED/HIGH SMDAGENT_<SID> System init1234 X X
MED CONTENTSERV System init1234 X
MED SMD_AGT System init1234 X
How do these users get created?
Every customer has a SAP Solution Manager.
Transaction SOLMAN_SETUP starts wizards for basic system setup and additional scenario’s
How do these users get created?
Class CL_SISE_CONSTANTS contains default attributes for the password
Why do these users get created?
• The SAP Solution Manager supports many scenario’s for managing the SAP landscape
• When scenario’s are activated, specific users are created per scenario
• Some examples of scenario’s:
– Technical monitoring
– Data volume management
– Custom code management
Where do they get created?
• Most user get created in Solution Manager,
• SMDAGENT_<SID> user also in satellite systems for Solution Manager Diagnostics
scenario
USER TYPE PASSWORD SOLMAN SATELLITE
SMD_ADMIN System init1234 X
SMD_BI_RFC System init1234 X
SMD_RFC System init1234 X
SOLMAN_ADMIN Dialog init1234 X
SOLMAN_BTC System init1234 X
SAPSUPPORT Dialog init1234 X X
SOLMAN<SID><CLNT> Dialog init1234 X
SMD_AGT System init1234 X
CONTENTSERV System init1234 X
SMDAGENT_<SID> System init1234 X X
Impact
SAP Solution Manager, right in the middle of your business systems…
• The SAP Solution Manager is the heart of your SAP landscape and connects to the
other SAP systems
• Often seen as the ‘Spider in the web’ or the ‘Active Directory’ of SAP landscapes
• Leaves the entire SAP landscape at risk when compromised.
Impact
So how bad is this…
• If those users exist with the default password? BAD!
• Some of these users have broad authorisations. In some cases profile
SAP_J2EE_ADMIN was added.
• The SAP Solution Manager is often seen as a technical system, authorisations
handled by the basis team (not their core business).
• See the SAP Security guide for all created users and roles.
Exploitation
(Combined with other Vulnerabilities) these users can do
• Native SQL execution
• SMB relay
• OS command execution
• Creating new SAP users
• Retreival and bruteforcing of password hashes
• Etc, etc…
All leading to a Full business compromise!
Exploitation
Exploitation Example 1
• Dialog user SAPSUPPORT / init1234
• Has many roles, amongst which ZSAP_SM_SA38  execute any ABAP program:
• Use program RSSAA_CALLEXTERN to inject OS commands
Exploitation
Exploitation
Exploitation Example 2: Snagging SAP credentials
• System user SMDAGENT_<SID>
• Exists in Sol. Manager AND connected systems!
• Combines remote FM (/SDF/GEN_PROXY ) that
acts as wrapper to call local FM
(/SDF/RBE_NATSQL_SELECT ) to execute SQL
• Retreive ANY DB table content.
• Example: PW hashes --> bruteforce offline
Exploitation
Exploitation
Exploitation Example 3
• System user SOLMAN_BTC / init1234
• Can be used to execute OS commands via Function Module SXPG_STEP_XPG_START
• And from there use the implicit trust relation to the Database to create an SAP user
directly in the SAP database with SAP_ALL (no application level audit).
Exploitation
Exploitation
Exploitation Example 4: Metasploit command shell
• System user SOLMAN_BTC / init1234
• Use Metasploit (also see @nmonkee his MWR modules!)
• For example:
Exploitation
Exploitation
Exploitation Example 5: POST-EXPLOITATION: PoC SAP ransomware
• Why not take a complete business for ransom?
• That’s where the money is and a sense of urgency to pay
• Personal prediction: Similar things seen in the wild within couple of years
Research
How we discovered this
• Found by indexing ABAP sourcecode with SOLR (Credits to Martin Ceronio)
• RTFM: SAP Solution Manager 7.0 EHP1 End-to-End Root Cause Analysis – User
Administration guide
Research
How we discovered this
• SAP note 1265580
Solutions
How to protect?
Use the free tooling from our website
to detect if mentioned users exist with
a default password in your SAP systems.
Alternatively use SAP Security hero
Martin Gallo his PySAP tooling.
https://github.com/CoreSecurity/pysap
Solutions
How to protect?
• See SAP Security note 2293011 for help
• Check and change passwords of before mentioned users
• Delete user SMD_ADMIN if you operate SAP Solution Manager 7.1 SP10 or higher.
• Also see SAP notes
– 1985387 - Potential information disclosure relating to SAP Solution Manager
– 2119627 - Change the Password for the Diagnostics Agent Connection User in SAP Solution Manager
– 1774432 - Missing authorization check in ST-PI
– 1727914 - Missing authorization checks in ST-PI
– 1535611 - Missing authorization check in ST-PI
– 2248735 - Code injection vulnerability in System Administration Assistant
– 1416085 - PFCG: Authorization maintenance for object S_RFCACL
• Do not use “*” values for authorisation objects S_RFC and S_RFCACL
• Setup honeytokens for users that are not needed for operations
• Freshly installed SAP Solution Manager 7.1 and 7.2 systems are not concerned 
Consider installing fresh system instead of upgrade (depending on configuration)
Future work
More research needed in some areas:
• Get better insight in exact amount of affected systems
• Get better understanding of all individual users and roles they have and how these
evolved over time
• Get better understanding as of which particular versions users where created with
default passwords
Concluding
Wrapping up:
• Do not solely trust on Segregation of Duties, but remember SAP Security is also about
your SAP Application, Operating system, Database, Network components, Frontends…
• Check and change passwords of all default accounts in all clients in all systems
• Patch, patch, patch
• Involve other teams
• Do periodic reviews of code, authorizations and platform/infrastructure security
(tooling can help)
• Read the documentation
References
For more information please refer to:
SAP Security notes:
2293011- Upgrade Information: Default Users within SAP Solution Manager
2253549 - The SAP Security Baseline Template
1985387 - Potential information disclosure relating to SAP Solution Manager
2119627 - Change the Password for the Diagnostics Agent Connection User in SAP Solution Manager
1774432 - Missing authorization check in ST-PI
1727914 - Missing authorization checks in ST-PI
1535611 - Missing authorization check in ST-PI
2248735 - Code injection vulnerability in System Administration Assistant
1416085 - PFCG: Authorization maintenance for object S_RFCACL
SAP Security guide for the SAP Solution Manager
Metasploit framework SAP user extract module
ABAP Indexing via SOLR
MWR Metasploit modules
ERP-SEC free tooling
CoreSecurity PySAP
Questions
“When a bug finally makes itself known, it can be
exhilarating, like you just unlocked something. A grand
opportunity waiting to be taken advantage of.”
Source: Mr Robot S01E03 d3bug
?
SAP, R/3, ABAP, SAP GUI, SAP NetWeaver and other SAP products and services mentioned herein as
well as their respective logos are trademarks or registered trademarks of SAP AG in Germany and
other countries.
All other product and service names mentioned are the trademarks of their respective companies.
Data contained in this document serves informational purposes only.
The authors assume no responsibility for errors or omissions in this document. The authors do not
warrant the accuracy or completeness of the information, text, graphics, links, or other items
contained within this material. This document is provided without a warranty of any kind, either
express or implied, including but not limited to the implied warranties of merchantability, fitness for a
particular purpose, or non-infringement.
The authors shall have no liability for damages of any kind including without limitation direct, special,
indirect, or consequential damages that may result from the use of this document.
SAP AG is neither the author nor the publisher of this publication and is not responsible for its
content, and SAP Group shall not be liable for errors or omissions with respect to the materials.
No part of this document may be reproduced without the prior written permission of ERP Security BV.
© 2016 ERP Security BV.
Disclaimer
Exploit new default accounts in SAP systems

Mais conteúdo relacionado

Mais procurados

1.3. (In)security Software
1.3. (In)security Software1.3. (In)security Software
1.3. (In)security Softwaredefconmoscow
 
Defcon 22-david-wyde-client-side-http-cookie-security
Defcon 22-david-wyde-client-side-http-cookie-securityDefcon 22-david-wyde-client-side-http-cookie-security
Defcon 22-david-wyde-client-side-http-cookie-securityPriyanka Aash
 
Introduction to Mobile Application Security - Techcity 2015 (Vilnius)
Introduction to Mobile Application Security - Techcity 2015 (Vilnius)Introduction to Mobile Application Security - Techcity 2015 (Vilnius)
Introduction to Mobile Application Security - Techcity 2015 (Vilnius)Luca Bongiorni
 
Advanced SQL Injection Attack & Defenses
Advanced SQL Injection Attack & DefensesAdvanced SQL Injection Attack & Defenses
Advanced SQL Injection Attack & DefensesTiago Mendo
 
BlueHat v17 || KERNELFAULT: R00ting the Unexploitable using Hardware Fault In...
BlueHat v17 || KERNELFAULT: R00ting the Unexploitable using Hardware Fault In...BlueHat v17 || KERNELFAULT: R00ting the Unexploitable using Hardware Fault In...
BlueHat v17 || KERNELFAULT: R00ting the Unexploitable using Hardware Fault In...BlueHat Security Conference
 
Ten Commandments of Secure Coding
Ten Commandments of Secure CodingTen Commandments of Secure Coding
Ten Commandments of Secure CodingMateusz Olejarka
 
Mirai botnet
Mirai botnetMirai botnet
Mirai botnetOWASP
 
Freeware Security Tools You Need
Freeware Security Tools You NeedFreeware Security Tools You Need
Freeware Security Tools You Needamiable_indian
 
Racf psw enhancement
Racf psw enhancementRacf psw enhancement
Racf psw enhancementLuigi Perrone
 
[OWASP Poland Day] Web App Security Architectures
[OWASP Poland Day] Web App Security Architectures[OWASP Poland Day] Web App Security Architectures
[OWASP Poland Day] Web App Security ArchitecturesOWASP
 
BlueHat 2014 - The Attacker's View of Windows Authentication and Post Exploit...
BlueHat 2014 - The Attacker's View of Windows Authentication and Post Exploit...BlueHat 2014 - The Attacker's View of Windows Authentication and Post Exploit...
BlueHat 2014 - The Attacker's View of Windows Authentication and Post Exploit...Benjamin Delpy
 
Denis Baranov: Root via XSS
Denis Baranov: Root via XSSDenis Baranov: Root via XSS
Denis Baranov: Root via XSSqqlan
 
Android Application Security
Android Application SecurityAndroid Application Security
Android Application SecurityChong-Kuan Chen
 
SSL Pinning and Bypasses: Android and iOS
SSL Pinning and Bypasses: Android and iOSSSL Pinning and Bypasses: Android and iOS
SSL Pinning and Bypasses: Android and iOSAnant Shrivastava
 
Web Intrusion Detection
Web Intrusion Detection Web Intrusion Detection
Web Intrusion Detection Abhishek Singh
 
Hacked? Pray that the Attacker used PowerShell
Hacked? Pray that the Attacker used PowerShellHacked? Pray that the Attacker used PowerShell
Hacked? Pray that the Attacker used PowerShellNikhil Mittal
 
Хакеры хотят ваш банк больше, чем ваших клиентов
Хакеры хотят ваш банк больше, чем ваших клиентовХакеры хотят ваш банк больше, чем ваших клиентов
Хакеры хотят ваш банк больше, чем ваших клиентовPositive Hack Days
 
Top 10 secure boot mistakes
Top 10 secure boot mistakesTop 10 secure boot mistakes
Top 10 secure boot mistakesJustin Black
 

Mais procurados (20)

1.3. (In)security Software
1.3. (In)security Software1.3. (In)security Software
1.3. (In)security Software
 
Defcon 22-david-wyde-client-side-http-cookie-security
Defcon 22-david-wyde-client-side-http-cookie-securityDefcon 22-david-wyde-client-side-http-cookie-security
Defcon 22-david-wyde-client-side-http-cookie-security
 
Introduction to Mobile Application Security - Techcity 2015 (Vilnius)
Introduction to Mobile Application Security - Techcity 2015 (Vilnius)Introduction to Mobile Application Security - Techcity 2015 (Vilnius)
Introduction to Mobile Application Security - Techcity 2015 (Vilnius)
 
Advanced SQL Injection Attack & Defenses
Advanced SQL Injection Attack & DefensesAdvanced SQL Injection Attack & Defenses
Advanced SQL Injection Attack & Defenses
 
iOS Application Pentesting
iOS Application PentestingiOS Application Pentesting
iOS Application Pentesting
 
BlueHat v17 || KERNELFAULT: R00ting the Unexploitable using Hardware Fault In...
BlueHat v17 || KERNELFAULT: R00ting the Unexploitable using Hardware Fault In...BlueHat v17 || KERNELFAULT: R00ting the Unexploitable using Hardware Fault In...
BlueHat v17 || KERNELFAULT: R00ting the Unexploitable using Hardware Fault In...
 
Ten Commandments of Secure Coding
Ten Commandments of Secure CodingTen Commandments of Secure Coding
Ten Commandments of Secure Coding
 
Mirai botnet
Mirai botnetMirai botnet
Mirai botnet
 
Kioptrix 2014 5
Kioptrix 2014 5Kioptrix 2014 5
Kioptrix 2014 5
 
Freeware Security Tools You Need
Freeware Security Tools You NeedFreeware Security Tools You Need
Freeware Security Tools You Need
 
Racf psw enhancement
Racf psw enhancementRacf psw enhancement
Racf psw enhancement
 
[OWASP Poland Day] Web App Security Architectures
[OWASP Poland Day] Web App Security Architectures[OWASP Poland Day] Web App Security Architectures
[OWASP Poland Day] Web App Security Architectures
 
BlueHat 2014 - The Attacker's View of Windows Authentication and Post Exploit...
BlueHat 2014 - The Attacker's View of Windows Authentication and Post Exploit...BlueHat 2014 - The Attacker's View of Windows Authentication and Post Exploit...
BlueHat 2014 - The Attacker's View of Windows Authentication and Post Exploit...
 
Denis Baranov: Root via XSS
Denis Baranov: Root via XSSDenis Baranov: Root via XSS
Denis Baranov: Root via XSS
 
Android Application Security
Android Application SecurityAndroid Application Security
Android Application Security
 
SSL Pinning and Bypasses: Android and iOS
SSL Pinning and Bypasses: Android and iOSSSL Pinning and Bypasses: Android and iOS
SSL Pinning and Bypasses: Android and iOS
 
Web Intrusion Detection
Web Intrusion Detection Web Intrusion Detection
Web Intrusion Detection
 
Hacked? Pray that the Attacker used PowerShell
Hacked? Pray that the Attacker used PowerShellHacked? Pray that the Attacker used PowerShell
Hacked? Pray that the Attacker used PowerShell
 
Хакеры хотят ваш банк больше, чем ваших клиентов
Хакеры хотят ваш банк больше, чем ваших клиентовХакеры хотят ваш банк больше, чем ваших клиентов
Хакеры хотят ваш банк больше, чем ваших клиентов
 
Top 10 secure boot mistakes
Top 10 secure boot mistakesTop 10 secure boot mistakes
Top 10 secure boot mistakes
 

Destaque

Erp security joris-van_de_vis_sap_security_sitnl_2015_v0.2
Erp security joris-van_de_vis_sap_security_sitnl_2015_v0.2Erp security joris-van_de_vis_sap_security_sitnl_2015_v0.2
Erp security joris-van_de_vis_sap_security_sitnl_2015_v0.2jvandevis
 
What's new in SAP HANA SPS 11 Security
What's new in SAP HANA SPS 11 SecurityWhat's new in SAP HANA SPS 11 Security
What's new in SAP HANA SPS 11 SecuritySAP Technology
 
Aplicacion escritorio web
Aplicacion escritorio webAplicacion escritorio web
Aplicacion escritorio webmarianap611
 
Trulia Metro Movers Report - Fall 2011
Trulia Metro Movers Report - Fall 2011Trulia Metro Movers Report - Fall 2011
Trulia Metro Movers Report - Fall 2011Trulia
 
How to find and close more business (without spending a thing)
How to find and close more business (without spending a thing)How to find and close more business (without spending a thing)
How to find and close more business (without spending a thing)Heinz Marketing Inc
 
The reference collection
The reference collectionThe reference collection
The reference collectionvargas8854
 
พลังประชาชน ที่บุรีรัมย์
พลังประชาชน ที่บุรีรัมย์พลังประชาชน ที่บุรีรัมย์
พลังประชาชน ที่บุรีรัมย์konthaiuk
 
Planificacion de Su Seguridad Económica 2012
Planificacion de Su Seguridad Económica   2012Planificacion de Su Seguridad Económica   2012
Planificacion de Su Seguridad Económica 2012CGLFINS
 
ECHA Website Customer Insight Study Summary Report
ECHA Website Customer Insight Study Summary ReportECHA Website Customer Insight Study Summary Report
ECHA Website Customer Insight Study Summary ReportNikolaos Vaslamatzis
 
1 samuel 20 commentary
1 samuel 20 commentary1 samuel 20 commentary
1 samuel 20 commentaryGLENN PEASE
 
關中麥客
關中麥客關中麥客
關中麥客nhush
 
Университет в кармане
Университет в карманеУниверситет в кармане
Университет в карманеkulibin
 
1 samuel 14 commentary
1 samuel 14 commentary1 samuel 14 commentary
1 samuel 14 commentaryGLENN PEASE
 
Press Festival Via011
Press Festival Via011Press Festival Via011
Press Festival Via011Welcome Luiz
 
Helsinki Spark Meetup Nov 20 2015
Helsinki Spark Meetup Nov 20 2015Helsinki Spark Meetup Nov 20 2015
Helsinki Spark Meetup Nov 20 2015Chris Fregly
 
Deloitte Tech Trends 2014 Technical Debt
Deloitte Tech Trends 2014 Technical DebtDeloitte Tech Trends 2014 Technical Debt
Deloitte Tech Trends 2014 Technical DebtCAST
 
1 samuel 19 commentary
1 samuel 19 commentary1 samuel 19 commentary
1 samuel 19 commentaryGLENN PEASE
 
Unidad Didáctica Integrada. Joaquín Llamas
Unidad Didáctica Integrada. Joaquín LlamasUnidad Didáctica Integrada. Joaquín Llamas
Unidad Didáctica Integrada. Joaquín LlamasJoaquín Llamas Luque
 

Destaque (20)

Erp security joris-van_de_vis_sap_security_sitnl_2015_v0.2
Erp security joris-van_de_vis_sap_security_sitnl_2015_v0.2Erp security joris-van_de_vis_sap_security_sitnl_2015_v0.2
Erp security joris-van_de_vis_sap_security_sitnl_2015_v0.2
 
What's new in SAP HANA SPS 11 Security
What's new in SAP HANA SPS 11 SecurityWhat's new in SAP HANA SPS 11 Security
What's new in SAP HANA SPS 11 Security
 
Aplicacion escritorio web
Aplicacion escritorio webAplicacion escritorio web
Aplicacion escritorio web
 
Trulia Metro Movers Report - Fall 2011
Trulia Metro Movers Report - Fall 2011Trulia Metro Movers Report - Fall 2011
Trulia Metro Movers Report - Fall 2011
 
How to find and close more business (without spending a thing)
How to find and close more business (without spending a thing)How to find and close more business (without spending a thing)
How to find and close more business (without spending a thing)
 
The reference collection
The reference collectionThe reference collection
The reference collection
 
พลังประชาชน ที่บุรีรัมย์
พลังประชาชน ที่บุรีรัมย์พลังประชาชน ที่บุรีรัมย์
พลังประชาชน ที่บุรีรัมย์
 
Planificacion de Su Seguridad Económica 2012
Planificacion de Su Seguridad Económica   2012Planificacion de Su Seguridad Económica   2012
Planificacion de Su Seguridad Económica 2012
 
TDD for Testers
TDD for TestersTDD for Testers
TDD for Testers
 
ECHA Website Customer Insight Study Summary Report
ECHA Website Customer Insight Study Summary ReportECHA Website Customer Insight Study Summary Report
ECHA Website Customer Insight Study Summary Report
 
Zaragoza turismo-55
Zaragoza turismo-55Zaragoza turismo-55
Zaragoza turismo-55
 
1 samuel 20 commentary
1 samuel 20 commentary1 samuel 20 commentary
1 samuel 20 commentary
 
關中麥客
關中麥客關中麥客
關中麥客
 
Университет в кармане
Университет в карманеУниверситет в кармане
Университет в кармане
 
1 samuel 14 commentary
1 samuel 14 commentary1 samuel 14 commentary
1 samuel 14 commentary
 
Press Festival Via011
Press Festival Via011Press Festival Via011
Press Festival Via011
 
Helsinki Spark Meetup Nov 20 2015
Helsinki Spark Meetup Nov 20 2015Helsinki Spark Meetup Nov 20 2015
Helsinki Spark Meetup Nov 20 2015
 
Deloitte Tech Trends 2014 Technical Debt
Deloitte Tech Trends 2014 Technical DebtDeloitte Tech Trends 2014 Technical Debt
Deloitte Tech Trends 2014 Technical Debt
 
1 samuel 19 commentary
1 samuel 19 commentary1 samuel 19 commentary
1 samuel 19 commentary
 
Unidad Didáctica Integrada. Joaquín Llamas
Unidad Didáctica Integrada. Joaquín LlamasUnidad Didáctica Integrada. Joaquín Llamas
Unidad Didáctica Integrada. Joaquín Llamas
 

Semelhante a Exploit new default accounts in SAP systems

Practical SAP pentesting workshop (NullCon Goa)
Practical SAP pentesting workshop (NullCon Goa)Practical SAP pentesting workshop (NullCon Goa)
Practical SAP pentesting workshop (NullCon Goa)ERPScan
 
Practical SAP pentesting (B-Sides San Paulo)
Practical SAP pentesting (B-Sides San Paulo)Practical SAP pentesting (B-Sides San Paulo)
Practical SAP pentesting (B-Sides San Paulo)ERPScan
 
Annual OktCyberfest 2019
Annual OktCyberfest 2019Annual OktCyberfest 2019
Annual OktCyberfest 2019Fahad Al-Hasan
 
Short introduction to SAP security research (sitNL)
Short introduction to SAP security research (sitNL)Short introduction to SAP security research (sitNL)
Short introduction to SAP security research (sitNL)Twan van den Broek
 
SAP portal: breaking and forensicating
SAP portal: breaking and forensicating SAP portal: breaking and forensicating
SAP portal: breaking and forensicating ERPScan
 
ciso-platform-annual-summit-2013-New Framework for ERP Security
ciso-platform-annual-summit-2013-New Framework for ERP Securityciso-platform-annual-summit-2013-New Framework for ERP Security
ciso-platform-annual-summit-2013-New Framework for ERP SecurityPriyanka Aash
 
Breaking, forensicating and anti-forensicating SAP Portal and J2EE Engine
Breaking, forensicating and anti-forensicating SAP Portal and J2EE EngineBreaking, forensicating and anti-forensicating SAP Portal and J2EE Engine
Breaking, forensicating and anti-forensicating SAP Portal and J2EE EngineERPScan
 
Attacks Based on Security Configurations
Attacks Based on Security ConfigurationsAttacks Based on Security Configurations
Attacks Based on Security ConfigurationsOnapsis Inc.
 
Practical pentesting of ERPs and business applications
Practical pentesting of ERPs and business applicationsPractical pentesting of ERPs and business applications
Practical pentesting of ERPs and business applicationsERPScan
 
EAS-SEC: Framework for securing business applications
EAS-SEC: Framework for securing business applicationsEAS-SEC: Framework for securing business applications
EAS-SEC: Framework for securing business applicationsERPScan
 
Exploiting Critical Attack Vectors to Gain Control of SAP Systems
Exploiting Critical Attack Vectors to Gain Control of SAP SystemsExploiting Critical Attack Vectors to Gain Control of SAP Systems
Exploiting Critical Attack Vectors to Gain Control of SAP SystemsOnapsis Inc.
 
SAP security made easy
SAP security made easySAP security made easy
SAP security made easyERPScan
 
Implementing SAP security in 5 steps
Implementing SAP security in 5 stepsImplementing SAP security in 5 steps
Implementing SAP security in 5 stepsERPScan
 
Oracle apps scm online training
Oracle apps scm online trainingOracle apps scm online training
Oracle apps scm online trainingsaptpmit
 
Sap security online training
Sap security online trainingSap security online training
Sap security online trainingsapscmit
 
Představení Oracle SPARC Miniclusteru
Představení Oracle SPARC MiniclusteruPředstavení Oracle SPARC Miniclusteru
Představení Oracle SPARC MiniclusteruMarketingArrowECS_CZ
 
Attacking SAP users with sapsploit
Attacking SAP users with sapsploit Attacking SAP users with sapsploit
Attacking SAP users with sapsploit ERPScan
 

Semelhante a Exploit new default accounts in SAP systems (20)

Practical SAP pentesting workshop (NullCon Goa)
Practical SAP pentesting workshop (NullCon Goa)Practical SAP pentesting workshop (NullCon Goa)
Practical SAP pentesting workshop (NullCon Goa)
 
Practical SAP pentesting (B-Sides San Paulo)
Practical SAP pentesting (B-Sides San Paulo)Practical SAP pentesting (B-Sides San Paulo)
Practical SAP pentesting (B-Sides San Paulo)
 
Annual OktCyberfest 2019
Annual OktCyberfest 2019Annual OktCyberfest 2019
Annual OktCyberfest 2019
 
Short introduction to SAP security research (sitNL)
Short introduction to SAP security research (sitNL)Short introduction to SAP security research (sitNL)
Short introduction to SAP security research (sitNL)
 
SAP portal: breaking and forensicating
SAP portal: breaking and forensicating SAP portal: breaking and forensicating
SAP portal: breaking and forensicating
 
ciso-platform-annual-summit-2013-New Framework for ERP Security
ciso-platform-annual-summit-2013-New Framework for ERP Securityciso-platform-annual-summit-2013-New Framework for ERP Security
ciso-platform-annual-summit-2013-New Framework for ERP Security
 
Breaking, forensicating and anti-forensicating SAP Portal and J2EE Engine
Breaking, forensicating and anti-forensicating SAP Portal and J2EE EngineBreaking, forensicating and anti-forensicating SAP Portal and J2EE Engine
Breaking, forensicating and anti-forensicating SAP Portal and J2EE Engine
 
Attacks Based on Security Configurations
Attacks Based on Security ConfigurationsAttacks Based on Security Configurations
Attacks Based on Security Configurations
 
SAST Managed Services for SAP [Webinar]
SAST Managed Services for SAP [Webinar]SAST Managed Services for SAP [Webinar]
SAST Managed Services for SAP [Webinar]
 
Practical pentesting of ERPs and business applications
Practical pentesting of ERPs and business applicationsPractical pentesting of ERPs and business applications
Practical pentesting of ERPs and business applications
 
EAS-SEC: Framework for securing business applications
EAS-SEC: Framework for securing business applicationsEAS-SEC: Framework for securing business applications
EAS-SEC: Framework for securing business applications
 
Exploiting Critical Attack Vectors to Gain Control of SAP Systems
Exploiting Critical Attack Vectors to Gain Control of SAP SystemsExploiting Critical Attack Vectors to Gain Control of SAP Systems
Exploiting Critical Attack Vectors to Gain Control of SAP Systems
 
SAP security made easy
SAP security made easySAP security made easy
SAP security made easy
 
Implementing SAP security in 5 steps
Implementing SAP security in 5 stepsImplementing SAP security in 5 steps
Implementing SAP security in 5 steps
 
Oracle apps scm online training
Oracle apps scm online trainingOracle apps scm online training
Oracle apps scm online training
 
Sap security online training
Sap security online trainingSap security online training
Sap security online training
 
Představení Oracle SPARC Miniclusteru
Představení Oracle SPARC MiniclusteruPředstavení Oracle SPARC Miniclusteru
Představení Oracle SPARC Miniclusteru
 
Attacking SAP users with sapsploit
Attacking SAP users with sapsploit Attacking SAP users with sapsploit
Attacking SAP users with sapsploit
 
SAP
SAPSAP
SAP
 
SENTHIL RAMADOSS CV
SENTHIL RAMADOSS CVSENTHIL RAMADOSS CV
SENTHIL RAMADOSS CV
 

Mais de Cyber Security Alliance

Robots are among us, but who takes responsibility?
Robots are among us, but who takes responsibility?Robots are among us, but who takes responsibility?
Robots are among us, but who takes responsibility?Cyber Security Alliance
 
Why huntung IoC fails at protecting against targeted attacks
Why huntung IoC fails at protecting against targeted attacksWhy huntung IoC fails at protecting against targeted attacks
Why huntung IoC fails at protecting against targeted attacksCyber Security Alliance
 
Introducing Man in the Contacts attack to trick encrypted messaging apps
Introducing Man in the Contacts attack to trick encrypted messaging appsIntroducing Man in the Contacts attack to trick encrypted messaging apps
Introducing Man in the Contacts attack to trick encrypted messaging appsCyber Security Alliance
 
Understanding the fundamentals of attacks
Understanding the fundamentals of attacksUnderstanding the fundamentals of attacks
Understanding the fundamentals of attacksCyber Security Alliance
 
Reverse engineering Swisscom's Centro Grande Modem
Reverse engineering Swisscom's Centro Grande ModemReverse engineering Swisscom's Centro Grande Modem
Reverse engineering Swisscom's Centro Grande ModemCyber Security Alliance
 
Offline bruteforce attack on wi fi protected setup
Offline bruteforce attack on wi fi protected setupOffline bruteforce attack on wi fi protected setup
Offline bruteforce attack on wi fi protected setupCyber Security Alliance
 
App secforum2014 andrivet-cplusplus11-metaprogramming_applied_to_software_obf...
App secforum2014 andrivet-cplusplus11-metaprogramming_applied_to_software_obf...App secforum2014 andrivet-cplusplus11-metaprogramming_applied_to_software_obf...
App secforum2014 andrivet-cplusplus11-metaprogramming_applied_to_software_obf...Cyber Security Alliance
 
Killing any security product … using a Mimikatz undocumented feature
Killing any security product … using a Mimikatz undocumented featureKilling any security product … using a Mimikatz undocumented feature
Killing any security product … using a Mimikatz undocumented featureCyber Security Alliance
 
Asfws 2014 slides why .net needs ma-cs and other serial(-ization) tales_v2.0
Asfws 2014 slides why .net needs ma-cs and other serial(-ization) tales_v2.0Asfws 2014 slides why .net needs ma-cs and other serial(-ization) tales_v2.0
Asfws 2014 slides why .net needs ma-cs and other serial(-ization) tales_v2.0Cyber Security Alliance
 

Mais de Cyber Security Alliance (20)

Bug Bounty @ Swisscom
Bug Bounty @ SwisscomBug Bounty @ Swisscom
Bug Bounty @ Swisscom
 
Robots are among us, but who takes responsibility?
Robots are among us, but who takes responsibility?Robots are among us, but who takes responsibility?
Robots are among us, but who takes responsibility?
 
Why huntung IoC fails at protecting against targeted attacks
Why huntung IoC fails at protecting against targeted attacksWhy huntung IoC fails at protecting against targeted attacks
Why huntung IoC fails at protecting against targeted attacks
 
Blockchain for Beginners
Blockchain for Beginners Blockchain for Beginners
Blockchain for Beginners
 
Le pentest pour les nuls #cybsec16
Le pentest pour les nuls #cybsec16Le pentest pour les nuls #cybsec16
Le pentest pour les nuls #cybsec16
 
Introducing Man in the Contacts attack to trick encrypted messaging apps
Introducing Man in the Contacts attack to trick encrypted messaging appsIntroducing Man in the Contacts attack to trick encrypted messaging apps
Introducing Man in the Contacts attack to trick encrypted messaging apps
 
Understanding the fundamentals of attacks
Understanding the fundamentals of attacksUnderstanding the fundamentals of attacks
Understanding the fundamentals of attacks
 
Rump : iOS patch diffing
Rump : iOS patch diffingRump : iOS patch diffing
Rump : iOS patch diffing
 
Reverse engineering Swisscom's Centro Grande Modem
Reverse engineering Swisscom's Centro Grande ModemReverse engineering Swisscom's Centro Grande Modem
Reverse engineering Swisscom's Centro Grande Modem
 
Offline bruteforce attack on wi fi protected setup
Offline bruteforce attack on wi fi protected setupOffline bruteforce attack on wi fi protected setup
Offline bruteforce attack on wi fi protected setup
 
App secforum2014 andrivet-cplusplus11-metaprogramming_applied_to_software_obf...
App secforum2014 andrivet-cplusplus11-metaprogramming_applied_to_software_obf...App secforum2014 andrivet-cplusplus11-metaprogramming_applied_to_software_obf...
App secforum2014 andrivet-cplusplus11-metaprogramming_applied_to_software_obf...
 
Killing any security product … using a Mimikatz undocumented feature
Killing any security product … using a Mimikatz undocumented featureKilling any security product … using a Mimikatz undocumented feature
Killing any security product … using a Mimikatz undocumented feature
 
Rump attaque usb_caralinda_fabrice
Rump attaque usb_caralinda_fabriceRump attaque usb_caralinda_fabrice
Rump attaque usb_caralinda_fabrice
 
Hacking the swisscom modem
Hacking the swisscom modemHacking the swisscom modem
Hacking the swisscom modem
 
Colt sp sec2014_appsec-nf-vfinal
Colt sp sec2014_appsec-nf-vfinalColt sp sec2014_appsec-nf-vfinal
Colt sp sec2014_appsec-nf-vfinal
 
Asfws2014 tproxy
Asfws2014 tproxyAsfws2014 tproxy
Asfws2014 tproxy
 
Asfws 2014 slides why .net needs ma-cs and other serial(-ization) tales_v2.0
Asfws 2014 slides why .net needs ma-cs and other serial(-ization) tales_v2.0Asfws 2014 slides why .net needs ma-cs and other serial(-ization) tales_v2.0
Asfws 2014 slides why .net needs ma-cs and other serial(-ization) tales_v2.0
 
Appsec rump reverse-i_os_machook
Appsec rump reverse-i_os_machookAppsec rump reverse-i_os_machook
Appsec rump reverse-i_os_machook
 
Appsecforum2014 nov14-bk-cryptool-rump
Appsecforum2014 nov14-bk-cryptool-rumpAppsecforum2014 nov14-bk-cryptool-rump
Appsecforum2014 nov14-bk-cryptool-rump
 
Appsec obfuscator reloaded
Appsec obfuscator reloadedAppsec obfuscator reloaded
Appsec obfuscator reloaded
 

Último

Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...MyIntelliSource, Inc.
 
How To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.jsHow To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.jsAndolasoft Inc
 
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Steffen Staab
 
Diamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with PrecisionDiamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with PrecisionSolGuruz
 
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AISyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AIABDERRAOUF MEHENNI
 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVshikhaohhpro
 
5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdfWave PLM
 
Right Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsRight Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsJhone kinadey
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comFatema Valibhai
 
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...OnePlan Solutions
 
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...panagenda
 
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...Health
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providermohitmore19
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Modelsaagamshah0812
 
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...harshavardhanraghave
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...MyIntelliSource, Inc.
 
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️anilsa9823
 
Software Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsSoftware Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsArshad QA
 

Último (20)

Microsoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdfMicrosoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdf
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
 
How To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.jsHow To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.js
 
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
 
Diamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with PrecisionDiamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with Precision
 
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AISyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
 
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS LiveVip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTV
 
5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf
 
Right Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsRight Money Management App For Your Financial Goals
Right Money Management App For Your Financial Goals
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.com
 
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
 
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
 
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service provider
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Models
 
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
 
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️
 
Software Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsSoftware Quality Assurance Interview Questions
Software Quality Assurance Interview Questions
 

Exploit new default accounts in SAP systems

  • 1. Exploiting new default accounts in SAP systems
  • 2. Introduction Something about SAP security Unknown default accounts Impact Exploitation: combination with other vulnerabilities Research Solutions Concluding Agenda
  • 3. Introduction Who is ERP-SEC • Company specialised in securing SAP systems and infrastructures • Regular presenters on SAP Security • Research: Reported and credited for dozens of SAP vulnerabilities • Developer Protect4S – SAP Certified Security Analyser for SAPTM • SAP Development Partner • Our mission is to raise the security of mission–critical SAP platforms with minimal impact on day–to–day business. Who am I • SAP Technology enthusiast • SAP security researcher (1395) • Co-founder ERP-SEC • 15+ years background in SAP technology / SAP security (SAP basis)
  • 4. Something about SAP • Market leader in enterprise application software • ~ 300.000 customers worldwide • SAP customers include: – 87% of the Forbes Global 2000 companies – 98% of the 100 most valued brands • Headquarters: Walldorf, Germany, offices in more than 130 countries • Founded April 1, 1972 • Over 75.000 employees worldwide • 74% of the world’s transaction revenue touches an SAP system • Bottomline: Interesting Target! Source: http://www.sap.com/bin/sapcom/en_us/downloadasset.2016-01-jan-26-01.SAP-Corporate-Fact-Sheet-En-20160126-pdf.bypassReg.html Something about SAP
  • 5. Switzerland – IPv4 scanning for SAProuter, SAP RFC Gateway and SAP Diag ports Something about SAP http://zonums.com/iptools/ipmapper.php
  • 6. SAP Security General state of SAP security • We see more awareness at customers for SAP security but from awareness to action is still not the default • The bigger the company, the more SAP security they do • Still a large part of customers lack basic security measures, especially the ones outside the Fortune 2000 • SAP is working hard to improve security for years now. See for example the SAP Security Baseline. Now it’s up to customers to take action… • In 100% of our SAP Security assessments we found SAP default accounts.
  • 7. SAP Security When doing SAP Security assessments… No need to explain: most easy way in via username & password Who needs buffer overflows, DEP/ASLR bypass, XSS, SQLi when you have credentials Two big attack vectors in every SAP system: • SAP Default accounts • SAP RFC gateway (and from there RFC pivoting …) Owning SAP systems often comes down to getting access to credentials. Sniff / social engineer / phish for accounts Easiest option: Default accounts!!!
  • 8. Default accounts and IoT Default accounts - Mirai http://www.csoonline.com/article/3126924/security/here-are-the-61-passwords-that-powered-the-mirai-iot-botnet.html
  • 9. Default SAP accounts Publically known SAP default accounts RISK USER PASSWORD CLIENT REMARK Very High SAP* 06071992 / PASS 001,066,etc… Hardcoded kernel user Very High IDEADM admin Almost all IDES clients Only in IDES systems Very High DDIC 19920706 000,001,… User has SAP_ALL High CTB_ADMIN sap123 N.A. Java user High EARLYWATCH SUPPORT 066 Has rights to get password hash for SAP* from USR02 table and sometimes OS execution Medium TMSADM PASSWORD / $1Pawd2& 000, sometimes copied to others A new default password as the old one was too well known? Medium / Low SAPCPIC ADMIN 000,001 Can be used for information retrieval and in some cases for vulnerabilities where only authentication is needed
  • 10. Default SAP accounts Accounts with a previously unknown SAP default password Let’s meet some new default accounts*: *The list does not include the more recent users like for example SM_<SM-SID> that are created with a custom password CVE-2016-4033 RISK USER TYPE PASSWORD SOLMAN SATELLITE HIGH SMD_ADMIN System init1234 X HIGH SMD_BI_RFC System init1234 X HIGH SMD_RFC System init1234 X HIGH SOLMAN_ADMIN Dialog init1234 X HIGH SOLMAN_BTC System init1234 X HIGH SAPSUPPORT Dialog init1234 X X HIGH SOLMAN<SID><CLNT> Dialog init1234 X MED/HIGH SMDAGENT_<SID> System init1234 X X MED CONTENTSERV System init1234 X MED SMD_AGT System init1234 X
  • 11. How do these users get created? Every customer has a SAP Solution Manager. Transaction SOLMAN_SETUP starts wizards for basic system setup and additional scenario’s
  • 12. How do these users get created? Class CL_SISE_CONSTANTS contains default attributes for the password
  • 13. Why do these users get created? • The SAP Solution Manager supports many scenario’s for managing the SAP landscape • When scenario’s are activated, specific users are created per scenario • Some examples of scenario’s: – Technical monitoring – Data volume management – Custom code management
  • 14. Where do they get created? • Most user get created in Solution Manager, • SMDAGENT_<SID> user also in satellite systems for Solution Manager Diagnostics scenario USER TYPE PASSWORD SOLMAN SATELLITE SMD_ADMIN System init1234 X SMD_BI_RFC System init1234 X SMD_RFC System init1234 X SOLMAN_ADMIN Dialog init1234 X SOLMAN_BTC System init1234 X SAPSUPPORT Dialog init1234 X X SOLMAN<SID><CLNT> Dialog init1234 X SMD_AGT System init1234 X CONTENTSERV System init1234 X SMDAGENT_<SID> System init1234 X X
  • 15. Impact SAP Solution Manager, right in the middle of your business systems… • The SAP Solution Manager is the heart of your SAP landscape and connects to the other SAP systems • Often seen as the ‘Spider in the web’ or the ‘Active Directory’ of SAP landscapes • Leaves the entire SAP landscape at risk when compromised.
  • 16. Impact So how bad is this… • If those users exist with the default password? BAD! • Some of these users have broad authorisations. In some cases profile SAP_J2EE_ADMIN was added. • The SAP Solution Manager is often seen as a technical system, authorisations handled by the basis team (not their core business). • See the SAP Security guide for all created users and roles.
  • 17. Exploitation (Combined with other Vulnerabilities) these users can do • Native SQL execution • SMB relay • OS command execution • Creating new SAP users • Retreival and bruteforcing of password hashes • Etc, etc… All leading to a Full business compromise!
  • 18. Exploitation Exploitation Example 1 • Dialog user SAPSUPPORT / init1234 • Has many roles, amongst which ZSAP_SM_SA38  execute any ABAP program: • Use program RSSAA_CALLEXTERN to inject OS commands
  • 20. Exploitation Exploitation Example 2: Snagging SAP credentials • System user SMDAGENT_<SID> • Exists in Sol. Manager AND connected systems! • Combines remote FM (/SDF/GEN_PROXY ) that acts as wrapper to call local FM (/SDF/RBE_NATSQL_SELECT ) to execute SQL • Retreive ANY DB table content. • Example: PW hashes --> bruteforce offline
  • 22. Exploitation Exploitation Example 3 • System user SOLMAN_BTC / init1234 • Can be used to execute OS commands via Function Module SXPG_STEP_XPG_START • And from there use the implicit trust relation to the Database to create an SAP user directly in the SAP database with SAP_ALL (no application level audit).
  • 24. Exploitation Exploitation Example 4: Metasploit command shell • System user SOLMAN_BTC / init1234 • Use Metasploit (also see @nmonkee his MWR modules!) • For example:
  • 26. Exploitation Exploitation Example 5: POST-EXPLOITATION: PoC SAP ransomware • Why not take a complete business for ransom? • That’s where the money is and a sense of urgency to pay • Personal prediction: Similar things seen in the wild within couple of years
  • 27. Research How we discovered this • Found by indexing ABAP sourcecode with SOLR (Credits to Martin Ceronio) • RTFM: SAP Solution Manager 7.0 EHP1 End-to-End Root Cause Analysis – User Administration guide
  • 28. Research How we discovered this • SAP note 1265580
  • 29. Solutions How to protect? Use the free tooling from our website to detect if mentioned users exist with a default password in your SAP systems. Alternatively use SAP Security hero Martin Gallo his PySAP tooling. https://github.com/CoreSecurity/pysap
  • 30. Solutions How to protect? • See SAP Security note 2293011 for help • Check and change passwords of before mentioned users • Delete user SMD_ADMIN if you operate SAP Solution Manager 7.1 SP10 or higher. • Also see SAP notes – 1985387 - Potential information disclosure relating to SAP Solution Manager – 2119627 - Change the Password for the Diagnostics Agent Connection User in SAP Solution Manager – 1774432 - Missing authorization check in ST-PI – 1727914 - Missing authorization checks in ST-PI – 1535611 - Missing authorization check in ST-PI – 2248735 - Code injection vulnerability in System Administration Assistant – 1416085 - PFCG: Authorization maintenance for object S_RFCACL • Do not use “*” values for authorisation objects S_RFC and S_RFCACL • Setup honeytokens for users that are not needed for operations • Freshly installed SAP Solution Manager 7.1 and 7.2 systems are not concerned  Consider installing fresh system instead of upgrade (depending on configuration)
  • 31. Future work More research needed in some areas: • Get better insight in exact amount of affected systems • Get better understanding of all individual users and roles they have and how these evolved over time • Get better understanding as of which particular versions users where created with default passwords
  • 32. Concluding Wrapping up: • Do not solely trust on Segregation of Duties, but remember SAP Security is also about your SAP Application, Operating system, Database, Network components, Frontends… • Check and change passwords of all default accounts in all clients in all systems • Patch, patch, patch • Involve other teams • Do periodic reviews of code, authorizations and platform/infrastructure security (tooling can help) • Read the documentation
  • 33. References For more information please refer to: SAP Security notes: 2293011- Upgrade Information: Default Users within SAP Solution Manager 2253549 - The SAP Security Baseline Template 1985387 - Potential information disclosure relating to SAP Solution Manager 2119627 - Change the Password for the Diagnostics Agent Connection User in SAP Solution Manager 1774432 - Missing authorization check in ST-PI 1727914 - Missing authorization checks in ST-PI 1535611 - Missing authorization check in ST-PI 2248735 - Code injection vulnerability in System Administration Assistant 1416085 - PFCG: Authorization maintenance for object S_RFCACL SAP Security guide for the SAP Solution Manager Metasploit framework SAP user extract module ABAP Indexing via SOLR MWR Metasploit modules ERP-SEC free tooling CoreSecurity PySAP
  • 34. Questions “When a bug finally makes itself known, it can be exhilarating, like you just unlocked something. A grand opportunity waiting to be taken advantage of.” Source: Mr Robot S01E03 d3bug ?
  • 35. SAP, R/3, ABAP, SAP GUI, SAP NetWeaver and other SAP products and services mentioned herein as well as their respective logos are trademarks or registered trademarks of SAP AG in Germany and other countries. All other product and service names mentioned are the trademarks of their respective companies. Data contained in this document serves informational purposes only. The authors assume no responsibility for errors or omissions in this document. The authors do not warrant the accuracy or completeness of the information, text, graphics, links, or other items contained within this material. This document is provided without a warranty of any kind, either express or implied, including but not limited to the implied warranties of merchantability, fitness for a particular purpose, or non-infringement. The authors shall have no liability for damages of any kind including without limitation direct, special, indirect, or consequential damages that may result from the use of this document. SAP AG is neither the author nor the publisher of this publication and is not responsible for its content, and SAP Group shall not be liable for errors or omissions with respect to the materials. No part of this document may be reproduced without the prior written permission of ERP Security BV. © 2016 ERP Security BV. Disclaimer