Top 10 most interes.ng SAP vulnerabili.es and a9acks

Size: px
Start display at page:

Download "Top 10 most interes.ng SAP vulnerabili.es and a9acks"

Transcription

1 Invest in security to secure investments Top 10 most interes.ng SAP vulnerabili.es and a9acks Alexander Polyakov CTO at ERPScan

2 About ERPScan The only 360- degree SAP Security solu8on - ERPScan Security Monitoring Suite for SAP Leader by the number of acknowledgements from SAP ( 150+ ) 60+ presenta.ons key security conferences worldwide 25 Awards and nomina.ons Research team - 20 experts with experience in different areas of security Headquarters in Palo Alto (US) and Amsterdam (EU) 2

3 What is SAP? Shut up And Pay 3

4 Really The most popular business applica8on More than customers 74% of Forbes 500 4

5 Agenda Intro SAP security history SAP on the Internet Top 10 latest interes8ng apacks DEMOs Conclusion 5

6 3 areas of SAP Security 2002 Business logic security (SOD) Prevents a3acks or mistakes made Solu8on: GRC 2008 ABAP Code security Prevents a3acks or mistakes made by developers Solu8on: Code audit 2010 Applica3on pla4orm security Prevents unauthorized access both insiders and remote a3ackers Solu8on: Vulnerability Assessment and Monitoring 6

7 Talks about SAP security Most popular: BlackHat HITB Troopers RSA Source DeepSec etc

8 SAP Security notes By April 26, 2012, a total of 2026 notes

9 SAP vulnerabili.es by type 1 - Directory Traversal 2 - XSS/Unauthorised modifica8on of stored 3 - Missing Auth check 4 - Informa8on Disclosure 5 - Unauthorized usage of applica8on 6 - Hard- coded creden8als 7 - Code injec8on vulnerability 8 - Verb tampering 9 - Remote Code Execu8on 10 - Denial of service 11 - BOF 12 - SQL Inj Stats from : 1Q Q Q

10 SAP on the Internet We have collected data about SAP systems in the WEB Have various stats by countries, applica8ons, versions Informa8on from Google, Shodan, Nmap scan MYTH: SAP systems a9acks available only for insiders 10

11 SAP on the Internet About 5000 systems including Dispatcher, Message server, SapHostcontrol, Web- services 11

12 SAP on the Internet 12

13 Top 10 vulnerabili.es Authen8ca8on Bypass via Verb tampering 2. Authen8ca8on Bypass via the Invoker servlet 3. Buffer overflow in ABAP Kernel 4. Code execu8on via TH_GREP 5. MMC read SESSIONID 6. Remote portscan 7. Encryp8on in SAPGUI 8. BAPI XSS/SMBRELAY 9. XML Blowup DOS 10. GUI Scrip8ng DOS 13

14 10 GUI- Scrip.ng DOS: Descrip.on SAP users can run scripts which automate their user func8ons A script has the same rights in SAP as the user who launched it Security message which is shown to user can be turned off in the registry Almost any user can use SAP Messages (SM02 transac8on) New It is possible to run DOS apack on any user using a simple script Author: Dmitry Chastukhin (ERPScan) 14

15 10 GUI- scrip.ng: Other a9acks Script can be uploaded using: SAPGUI Ac8veX vulnerability Teensy USB flash Any other method of client exploita8on Other a9acks like changing banking accounts in LFBK also possible 15

16 10 GUI- scrip.ng: Business risks Sabotage High Espionage No Fraud No Ease of exploita.on Medium 16

17 10 GUI- scrip.ng: Preven.on SAP GUI Scrip8ng Security Guide sapgui/user_scrip8ng = FALSE Block registry modifica8on on worksta8ons 17

18 9 XML Blowup DOS: Descrip.on WEBRFC interface can be used to run RFC func8ons By default any user can have access Even without S_RFC auth SAP NetWeaver is vulnerable to malformed XML packets It is possible to run DOS apack on server using simple script It is possible to run over the Internet! New Author: Alexey Tyurin (ERPScan) 18

19 9 XML Blowup DOS: Demo 19

20 9 XML Blowup DOS: Business risks Sabotage Cri.cal Espionage No Fraud No Ease of exploita.on Medium 20

21 9 XML Blowup DOS: Preven.on Disable WEBRFC Prevent unauthorized access to WEBRFC using S_ICF Install SAP notes and

22 8 BAPI script injec.on/hash stealing : Descrip.on SAP BAPI transac8on fails to properly sani8ze input Possible to inject JavaScript code or link to a fake SMB server SAP GUI clients use Windows so their creden8als will be transferred to apackers host. Author: Dmitry Chastukhin (ERPScan) 22

23 8 BAPI script injec.on/hash stealing: Demo New 23

24 8 BAPI script injec.on/hash stealing: Business risks Espionage High Sabotage High Fraud High Ease of exploita.on Low 24

25 7 SAP GUI bad encryp.on: Descrip.on SAP FrontEnd can save encrypted passwords in shortcuts Shortcuts stored in.sap file This password uses byte- XOR algorithm with secret key Key has the same value for every installa8on of SAP GUI Any password can be decrypted in 1 second New Author: Alexey Sintsov (ERPScan) 25

26 7 SAP GUI bad encryp.on: Business risks Espionage High Sabotage Medium Fraud High Ease of exploita.on Medium 26

27 7 SAP GUI bad encryp.on: Preven.on Disable password storage in GUI 27

28 6 Remote port scan via JSP: Descrip.on It is possible to scan internal network from the Internet Authen.ca.on is not required SAP NetWeaver J2EE engine is vulnerable /ipcpricing/ui/bufferoverview.jsp? server= & port=31337 & password= & dispatcher= & targetclient= & view= Author: Alexander Polyakov (ERPScan) 28

29 6 Remote port scan via JSP: Demo HTTP port Port closed SAP port 29

30 6 Remote port scan via JSP: Business risks Sabotage Low Espionage Medium Fraud No Ease of exploita.on High 30

31 6 Remote port scan via JSP: Preven.on Install SAP notes: , , , , Disable unnecessary applica8ons 31

32 5 MMC JSESSIONID stealing: Descrip.on Remote management of SAP Platorm By default, many commands go without auth Exploits implemented in Metasploit (by ChrisJohnRiley) Most of the bugs are informa8on disclosure It is possible to find informa8on about JSESSIONID Only if trace is ON New 1) Original bug by ChrisJohnRiley 2) JSESSIONID by Alexey Sintsov and Alexey Tyurin (ERPScan) Can be authen.cated as an exis.ng user remotely 32

33 5 MMC JSESSIONID stealing: Business risks Espionage Cri.cal Fraud High Sabotage Medium Ease of exploita.on Medium 33

34 5 MMC JSESSIONID stealing: Preven.on The JSESSIONID by default will not be logged in log file Don t use TRACE_LEVEL = 3 on produc8on systems or delete traces aver use Other info hpp://help.sap.com/saphelp_nwpi71/helpdata/en/ d6/49543b1e49bc1fe a114084/frameset.htm 34

35 4 Remote command execu.on in TH_GREP: Descrip.on RCE vulnerability in RFC module TH_GREP Found by Joris van de Vis SAP was not properly patched ( ) We have discovered that the patch can be bypassed in Windows Original bug by Joris van de Vis (erp- sec) Bypass by Alexey Tyurin (ERPScan) 35

36 4 RCE in TH_GREP: Details elseif opsys = 'Windows NT'. concatenate '/c:"' string '"' filename into grep_params in character mode. else. /*if linux*/ /* 185 */ replace all occurrences of '''' in local_string with '''"''"'''. /* 186 */ concatenate '''' local_string '''' filename into grep_params /* 187*/ in character mode. /* 188*/ endif. /* 188*/ 36

37 4 RCE in TH_GREP: Demo #1 37

38 4 - RCE in TH_GREP: More details 4 ways to execute vulnerable program Using transac8on "Se37 Using transac8on SM51 (thanks to Felix Granados) Using remote RFC call "TH_GREP" Using SOAP RFC call "TH_GREP" via web 38

39 4 RCE in TH_GREP: Demo #2 39

40 4 RCE in TH_GREP: Business risks Espionage High Sabotage Medium Fraud High Ease of exploita.on medium 40

41 4 RFC in TH_GREP: Preven.on Install SAP notes , Prevent access to cri8cal transac8ons and RFC func8ons Check the ABAP code of your Z- transac8ons for similar vulnerabili8es 41

42 3 - ABAP Kernel BOF: Descrip.on Presented by Andreas Wiegenstein at BlackHat EU 2011 Buffer overflow in SAP kernel func8on C_SAPGPARAM When NAME field is more than 108 chars Can be exploited by calling an FM which uses C_SAPGPARAM Example of report RSPO_R_SAPGPARAM Author: (VirtualForge) 42

43 3 ABAP Kernel BOF: Business risks Espionage Cri.cal Sabotage Cri.cal Fraud Cri.cal Ease of exploita.on Medium 43

44 3 ABAP Kernel BOF: Preven.on Install SAP notes: Correc8ng buffer overflow in ABAP system call Poten8al remote code execu8on in SAP Kernel Prevent access to cri8cal transac8ons and RFC func8ons Check the ABAP code of your Z- transac8ons for cri8cal calls 44

45 2 Invoker Servlet: Descrip.on Rapidly calls servlets by their class name Published by SAP in their security guides Possible to call any servlet from the applica8on Even if it is not declared in WEB.XML Can be used for auth bypass 45

46 2 - Invoker Servlet: Details <servlet>! <servlet-name>criticalaction</servlet-name>! <servlet-class>com.sap.admin.critical.action</servlet-class>! </servlet>! <servlet-mapping>! <servlet-name>criticalaction</</servlet-name>! <url-pattern>/admin/critical</url-pattern>! </servlet-mapping! <security-constraint>! <web-resource-collection>! <web-resource-name>restrictedaccess</web-resource-name>! <url-pattern>/admin/*</url-pattern>! <http-method>get</http-method>! </web-resource-collection>! <auth-constraint>!<role-name>admin</role-name>!</auth-constraint>! Author: Dmitry Chastukhin (ERPScan) </security-constraint>! What if we call /servlet/com.sap.admin.cri.cal.ac.on 46

47 2 Invoker servlet: Business risks Espionage High Sabotage High Fraud High Ease of use Very easy! 47

48 2 - Invoker servlet: Preven.on Update to the latest patch , EnableInvokerServletGlobally property of the servlet_jsp must be false If you can t install patches for some reason, you can check all WEB.XML files using ERPScan web.xml scanner manually. 48

49 1 VERB Tampering 49

50 1 st Place Verb Tampering <security-constraint>! <web-resource-collection>! <web-resource-name>restrictedaccess</web-resourcename>! <url-pattern>/admin/*</url-pattern>! <http-method>get</http-method>! </web-resource-collection>!!<auth-constraint>!<role-name>admin</role-name>!</auth-constraint>! </security-constraint>! Author: Alexander Polyakov (ERPScan)! What if we use HEAD instead of GET? 50

51 1 Verb tampering: Details CTC Secret interface for managing J2EE engine Can be accessed remotely Can run user management ac8ons: Add users Add to groups Run OS commands Start/Stop J2EE Remotely without authen.ca.on! 51

52 1 Verb tampering: Demo 52

53 1 Verb tampering: More details If patched, can be bypassed by the Invoker servlet! 53

54 1 Verb tampering: Business risks Espionage Cri.cal Sabotage Cri.cal Fraud Cri.cal Ease of use Very easy! 54

55 1 st Place Verb tampering: Preven.on Preven8on: Install SAP notes , Install other SAP notes about Verb Tampering (about 18) Scan applica8ons using ERPScan WEB.XML check tool or manually Secure WEB.XML by dele8ng all <hpp- method> Disable the applica8ons that are not necessary 55

56 Conclusion It is possible to be protected from almost all those kinds of issues and we are working hard with SAP to make it secure SAP Guides Regular Security assessments Monitoring technical security ABAP Code review Segrega.on of Du.es It s all in your hands 56

57 Future work Many of the researched things cannot be disclosed now because of our good relagonship with SAP Security Response Team, whom I would like to thank for cooperagon. However, if you want to see new demos and 0- days, follow us and a3end the future presentagons: PHDays in May (Moscow) Just4Mee8ng in July (Portugal) BlackHat USA in July (Las Vegas) 57

58 web: e- mail: TwiPer: Greetz to our crew who helped: Dmitriy Evdokimov, Alexey Sintsov, Alexey Tyurin, Pavel Kuzmin, Evgeniy Neelov. 58

Top 10 most interesting SAP vulnerabilities and attacks Alexander Polyakov

Top 10 most interesting SAP vulnerabilities and attacks Alexander Polyakov Invest in security to secure investments Top 10 most interesting SAP vulnerabilities and attacks Alexander Polyakov CTO at ERPScan May 9, 2012 Me Business application security expert What is SAP? Shut

More information

Invest in security to secure investments. Breaking SAP Portal. Dmitry Chastuhin Principal Researcher at ERPScan

Invest in security to secure investments. Breaking SAP Portal. Dmitry Chastuhin Principal Researcher at ERPScan Invest in security to secure investments Breaking SAP Portal Dmitry Chastuhin Principal Researcher at ERPScan 1 About ERPScan The only 360- degree SAP Security solu8on - ERPScan Security Monitoring Suite

More information

THE STATE OF SAP SECURITY 2013: VULNERABILITIES, THREATS AND TRENDS

THE STATE OF SAP SECURITY 2013: VULNERABILITIES, THREATS AND TRENDS THE STATE OF SAP SECURITY 2013: VULNERABILITIES, THREATS AND TRENDS Alexander Polyakov ERPScan Session ID: DAS-T03 Session Classification: Intermediate Agenda SAP: Intro SAP: vulnerabilities SAP: threats

More information

Alexander Polyakov CTO ERPScan

Alexander Polyakov CTO ERPScan Invest in security to secure investments ERP Security. Myths, Problems, Solu6ons Alexander Polyakov CTO ERPScan About ERPScan The only 360- degree SAP Security solu8on - ERPScan Security Monitoring Suite

More information

A GLOBAL SURVEY 2001 2013 Authors:

A GLOBAL SURVEY 2001 2013 Authors: 12 YEARS OF SAP SECURITY IN FIGURES: A GLOBAL SURVEY 2001 2013 Authors: Alexander Polyakov Alexey Tyurin Other contributors: Kirill Nikitenkov Evgeny Neyolov Alina Oprisko Dmitry Shimansky A GLOBAL SURVEY

More information

EAS-SEC Project: Securing Enterprise Business Applications

EAS-SEC Project: Securing Enterprise Business Applications EAS-SEC Project: Securing Enterprise Business Applications SESSION ID: SEC-W06 Alexander Polyakov CTO ERPScan @Twitter sh2kerr Alexander Polyakov CTO of the ERPScan inc EAS-SEC.org President Business application

More information

A crushing blow at the heart of SAP J2EE Engine. For BlackHat USA 2011. Version 1.0

A crushing blow at the heart of SAP J2EE Engine. For BlackHat USA 2011. Version 1.0 A crushing blow at the heart of SAP J2EE Engine. Architecture and program vulnerabilities in SAP s J2EE engine For BlackHat USA 2011. Version 1.0 Alexander Polyakov CTO at ERPScan Head of DSecRG Research

More information

If I want a perfect cyberweapon, I'll target ERP

If I want a perfect cyberweapon, I'll target ERP If I want a perfect cyberweapon, I'll target ERP Alexander Polyakov / ERPScan Session ID: ADS-R07 Session Classification: Advanced Intro I hate CYBER talks and all that buzz I usually do more technical

More information

www.erpscan.com www.eas- sec.org

www.erpscan.com www.eas- sec.org Analysis of 3000 vulnerabilities in SAP Disclaimer... 2 1. Intro... 3 2. Brief results... 4 3. General vulnerability statistics... 6 4. Number of acknowledgements to external researchers... 12 5. Vulnerabilities

More information

How to hack VMware vcenter server in 60 seconds

How to hack VMware vcenter server in 60 seconds Invest in security to secure investments How to hack VMware vcenter server in 60 seconds Alexey Sintsov, Alexander Minozhenko #whoami Pen-tester at ERPscan Company Researcher DCG#7812 CTF ERPScan Innovative

More information

Inception of the SAP Platform's Brain Attacks on SAP Solution Manager

Inception of the SAP Platform's Brain Attacks on SAP Solution Manager Inception of the SAP Platform's Brain Attacks on SAP Solution Manager Juan Perez-Etchegoyen [email protected] May 23 rd, 2012 HITB Conference, Amsterdam Disclaimer This publication is copyright 2012

More information

PRACTICAL PENTESTING OF ERP SYSTEMS AND BUSINESS

PRACTICAL PENTESTING OF ERP SYSTEMS AND BUSINESS PRACTICAL PENTESTING OF ERP SYSTEMS AND BUSINESS APPLICATIONS VERSION 1.0 10.07.2013 Authors: Alexander Polyakov Alexey Tyurin With help of: Dmitry Chastukhin Dmitry Evdokimov Evgeny Neyolov www.erpscan.com

More information

Forgotten World: Corporate Business Application Systems

Forgotten World: Corporate Business Application Systems Forgotten World: Corporate Business Application Systems Alexander Polyakov (dsecrg.com) Val Smith (AttackResearch.com) BlackHat DC 2011 1. Abstract... 3 2. Intro... 4 2.1. Threat... 4 2.2. Introduction

More information

Invest in security to secure investments Oracle PeopleSoft applications are under attacks!

Invest in security to secure investments Oracle PeopleSoft applications are under attacks! Invest in security to secure investments Oracle PeopleSoft applications are under attacks! Alexey Tyurin About ERPScan The only 360-degree SAP Security solution - ERPScan Security Monitoring Suite for

More information

VoIP Security How to prevent eavesdropping on VoIP conversa8ons. Dmitry Dessiatnikov

VoIP Security How to prevent eavesdropping on VoIP conversa8ons. Dmitry Dessiatnikov VoIP Security How to prevent eavesdropping on VoIP conversa8ons Dmitry Dessiatnikov DISCLAIMER All informa8on in this presenta8on is provided for informa8on purposes only and in no event shall Security

More information

The SAProuter An Internet Window to your SAP Platform (and beyond)

The SAProuter An Internet Window to your SAP Platform (and beyond) The SAProuter An Internet Window to your SAP Platform (and beyond) July 2, 2010 HITBSecConf, Amsterdam Disclaimer This publication is copyright 2010 Onapsis SRL All rights reserved. No portion of this

More information

Attacks to SAP. Web Applications Your crown jewels online. Mariano Nuñez Di Croce. Troopers, Germany. March 30th, 2011. mnunez@onapsis.

Attacks to SAP. Web Applications Your crown jewels online. Mariano Nuñez Di Croce. Troopers, Germany. March 30th, 2011. mnunez@onapsis. Attacks to SAP Web Applications Your crown jewels online Mariano Nuñez Di Croce [email protected] March 30th, 2011 Troopers, Germany Disclaimer This publication is copyright 2011 Onapsis SRL All rights

More information

ATTACKS TO SAP WEB APPLICATIONS

ATTACKS TO SAP WEB APPLICATIONS ATTACKS TO SAP WEB APPLICATIONS by Mariano Nuñez Di Croce [email protected] BlackHat DC 2011 Briefings Abstract "SAP platforms are only accessible internally". While that was true in many organizations

More information

Application Security Testing. Erez Metula (CISSP), Founder Application Security Expert [email protected]

Application Security Testing. Erez Metula (CISSP), Founder Application Security Expert ErezMetula@AppSec.co.il Application Security Testing Erez Metula (CISSP), Founder Application Security Expert [email protected] Agenda The most common security vulnerabilities you should test for Understanding the problems

More information

Web Application Report

Web Application Report Web Application Report This report includes important security information about your Web Application. Security Report This report was created by IBM Rational AppScan 8.5.0.1 11/14/2012 8:52:13 AM 11/14/2012

More information

Practical pentesting of ERP s and business applications

Practical pentesting of ERP s and business applications Invest in security to secure investments Practical pentesting of ERP s and business applications Alexander Polyakov CTO in ERPScan Alexey Tyurin Director of consulting department in ERPScan Alexander Polyakov

More information

Evolution of Penetration Testing

Evolution of Penetration Testing Alexander Polyakov, QSA,PA-QSA CTO Digital Security (dsec.ru) Head of DSecRG (dsecrg.com) ERPSCAN Architect (erpscan.com) Head of OWASP-EAS Pentests? Again? Why? Many companies are doing this Many companies

More information

Bank Hacking Live! Ofer Maor CTO, Hacktics Ltd. ATC-4, 12 Jun 2006, 4:30PM

Bank Hacking Live! Ofer Maor CTO, Hacktics Ltd. ATC-4, 12 Jun 2006, 4:30PM Bank Hacking Live! Ofer Maor CTO, Hacktics Ltd. ATC-4, 12 Jun 2006, 4:30PM Agenda Introduction to Application Hacking Demonstration of Attack Tool Common Web Application Attacks Live Bank Hacking Demonstration

More information

Members of the UK cyber security forum. Soteria Health Check. A Cyber Security Health Check for SAP systems

Members of the UK cyber security forum. Soteria Health Check. A Cyber Security Health Check for SAP systems Soteria Health Check A Cyber Security Health Check for SAP systems Soteria Cyber Security are staffed by SAP certified consultants. We are CISSP qualified, and members of the UK Cyber Security Forum. Security

More information

CRYPTUS DIPLOMA IN IT SECURITY

CRYPTUS DIPLOMA IN IT SECURITY CRYPTUS DIPLOMA IN IT SECURITY 6 MONTHS OF TRAINING ON ETHICAL HACKING & INFORMATION SECURITY COURSE NAME: CRYPTUS 6 MONTHS DIPLOMA IN IT SECURITY Course Description This is the Ethical hacking & Information

More information

Out of the Fire - Adding Layers of Protection When Deploying Oracle EBS to the Internet

Out of the Fire - Adding Layers of Protection When Deploying Oracle EBS to the Internet Out of the Fire - Adding Layers of Protection When Deploying Oracle EBS to the Internet March 8, 2012 Stephen Kost Chief Technology Officer Integrigy Corporation Phil Reimann Director of Business Development

More information

Vulnerability Assessment and Penetration Testing

Vulnerability Assessment and Penetration Testing Vulnerability Assessment and Penetration Testing Module 1: Vulnerability Assessment & Penetration Testing: Introduction 1.1 Brief Introduction of Linux 1.2 About Vulnerability Assessment and Penetration

More information

HI THIS IS URGENT PLZ FIX ASAP: Cri5cal Vulnerabili5es and Bug Bounty Programs

HI THIS IS URGENT PLZ FIX ASAP: Cri5cal Vulnerabili5es and Bug Bounty Programs HI THIS IS URGENT PLZ FIX ASAP: Cri5cal Vulnerabili5es and Bug Bounty Programs Kymberlee Price Senior Director of Researcher Opera5ons Bugcrowd @Kym_Possible whoami? Senior Director of a Red Team PSIRT

More information

Auditing the Security of an SAP HANA Implementation

Auditing the Security of an SAP HANA Implementation Produced by Wellesley Information Services, LLC, publisher of SAPinsider. 2015 Wellesley Information Services. All rights reserved. Auditing the Security of an SAP HANA Implementation Juan Perez-Etchegoyen

More information

Network Security. Computer Security & Forensics. Security in Compu5ng, Chapter 7. l Network Defences. l Firewalls. l Demilitarised Zones

Network Security. Computer Security & Forensics. Security in Compu5ng, Chapter 7. l Network Defences. l Firewalls. l Demilitarised Zones Network Security Security in Compu5ng, Chapter 7 Topics l Network AAacks l Reconnaissance l AAacks l Spoofing l Web Site Vulnerabili5es l Denial of Service l Network Defences l Firewalls l Demilitarised

More information

Thick Client Application Security

Thick Client Application Security Thick Client Application Security Arindam Mandal ([email protected]) (http://www.paladion.net) January 2005 This paper discusses the critical vulnerabilities and corresponding risks in a two

More information

Andreas Wiegenstein Dr. Markus Schumacher

Andreas Wiegenstein Dr. Markus Schumacher Andreas Wiegenstein Dr. Markus Schumacher PPT SAP Masterfolie GUI Hacking (V1.0) zur Troopers Erstellung Conference von 2011, Heidelberg Präsentationen Who am I Andreas PPT Masterfolie Wiegenstein CTO

More information

COURSE NAME: INFORMATION SECURITY INTERNSHIP PROGRAM

COURSE NAME: INFORMATION SECURITY INTERNSHIP PROGRAM COURSE NAME: INFORMATION SECURITY INTERNSHIP PROGRAM Course Description This is the Information Security Training program. The Training provides you Penetration Testing in the various field of cyber world.

More information

ERP Security. Myths, Problems, Solutions

ERP Security. Myths, Problems, Solutions ERP Security. Myths, Problems, Solutions Digital Security Ilya Medvedovskiy CEO of the Digital Security company Network security research since 1994 (NoVell networks) Book bestseller Attack through the

More information

Andreas Mertz (Founder/Man. Dir. it-cube SYSTEMS, CISSP) 360 SAP Security

Andreas Mertz (Founder/Man. Dir. it-cube SYSTEMS, CISSP) 360 SAP Security Andreas Mertz (Founder/Man. Dir. it-cube SYSTEMS, CISSP) 360 SAP Security Agenda Motivation SAP Threat Vectors / SAP Hack Solution Approach the 360 of agilesi Threat Detection Secenarios / SIEM use cases

More information

Research Paper SAP Penetration Testing Using Metasploit

Research Paper SAP Penetration Testing Using Metasploit Research Paper SAP Penetration Testing Using Metasploit How to Protect Sensitive ERP Data October 2013 Table of Contents Executive Summary 3 Introduction to Penetration Tests of SAP Systems 4 Understanding

More information

Attack Vector Detail Report Atlassian

Attack Vector Detail Report Atlassian Attack Vector Detail Report Atlassian Report As Of Tuesday, March 24, 2015 Prepared By Report Description Notes [email protected] The Attack Vector Details report provides details of vulnerability

More information

Penetration: from Application down to OS

Penetration: from Application down to OS April 13, 2010 Penetration: from Application down to OS Getting OS Access Using Lotus Domino Application Server Vulnerabilities Digitаl Security Research Group (DSecRG) www.dsecrg.com Alexandr Polyakov.

More information

3. Broken Account and Session Management. 4. Cross-Site Scripting (XSS) Flaws. Web browsers execute code sent from websites. Account Management

3. Broken Account and Session Management. 4. Cross-Site Scripting (XSS) Flaws. Web browsers execute code sent from websites. Account Management What is an? s Ten Most Critical Web Application Security Vulnerabilities Anthony LAI, CISSP, CISA Chapter Leader (Hong Kong) [email protected] Open Web Application Security Project http://www.owasp.org

More information

Some notes on SAP Security

Some notes on SAP Security Alexander Polyakov. PCI QSA,PA-QSA Director of Security Audit Department, Digital Security Head of Digital Security Research Group [DSecRG] [email protected] Some notes on SAP security Who is that guy?

More information

MatriXay Database Vulnerability Scanner V3.0

MatriXay Database Vulnerability Scanner V3.0 MatriXay Database Vulnerability Scanner V3.0 (DAS- DBScan) - - - The best database security assessment tool 1. Overview MatriXay Database Vulnerability Scanner (DAS- DBScan) is a professional tool with

More information

SAP Netweaver Application Server and Netweaver Portal Security

SAP Netweaver Application Server and Netweaver Portal Security VU University Amsterdam SAP Netweaver Application Server and Netweaver Portal Security Author: Nick Kirtley Supervisors: Abbas Shahim, Frank Hakkennes Date: 28-09-2012 Organization: VU University Amsterdam,

More information

OWASP and OWASP Top 10 (2007 Update) OWASP. The OWASP Foundation. Dave Wichers. The OWASP Foundation. OWASP Conferences Chair dave.wichers@owasp.

OWASP and OWASP Top 10 (2007 Update) OWASP. The OWASP Foundation. Dave Wichers. The OWASP Foundation. OWASP Conferences Chair dave.wichers@owasp. and Top 10 (2007 Update) Dave Wichers The Foundation Conferences Chair [email protected] COO, Aspect Security [email protected] Copyright 2007 - The Foundation This work is available

More information

Kaseya Fundamentals Workshop DAY THREE. Developed by Kaseya University. Powered by IT Scholars

Kaseya Fundamentals Workshop DAY THREE. Developed by Kaseya University. Powered by IT Scholars Kaseya Fundamentals Workshop DAY THREE Developed by Kaseya University Powered by IT Scholars Kaseya Version 6.5 Last updated March, 2014 Day Two Overview Day Two Lab Review Patch Management Configura;on

More information

Client logo placeholder XXX REPORT. Page 1 of 37

Client logo placeholder XXX REPORT. Page 1 of 37 Client logo placeholder XXX REPORT Page 1 of 37 Report Details Title Xxx Penetration Testing Report Version V1.0 Author Tester(s) Approved by Client Classification Confidential Recipient Name Title Company

More information

BSides London 2012. SAP Slapping. A Penetra3on Testers Guide

BSides London 2012. SAP Slapping. A Penetra3on Testers Guide BSides London 2012 SAP Slapping A Penetra3on Testers Guide CALL TRANSACTION SUIM Dave Hartley (@nmonkee). Principal Security Consultant @MWRInfoSecurity / @MWRLabs. CHECK and CREST Cer>fied (Applica>on

More information

SAP. Penetration Testing. with Onapsis Bizploit. Mariano Nuñez. Di Croce. HITB Security Conference, Dubai. April 22, 2010. mnunez@onapsis.

SAP. Penetration Testing. with Onapsis Bizploit. Mariano Nuñez. Di Croce. HITB Security Conference, Dubai. April 22, 2010. mnunez@onapsis. SAP Penetration Testing with Onapsis Bizploit Mariano Nuñez Di Croce [email protected] April 22, 2010 HITB Security Conference, Dubai Disclaimer This publication is copyright Onapsis SRL 2010 All rights

More information

Web Application Threats and Vulnerabilities Web Server Hacking and Web Application Vulnerability

Web Application Threats and Vulnerabilities Web Server Hacking and Web Application Vulnerability Web Application Threats and Vulnerabilities Web Server Hacking and Web Application Vulnerability WWW Based upon HTTP and HTML Runs in TCP s application layer Runs on top of the Internet Used to exchange

More information

Executive Summary On IronWASP

Executive Summary On IronWASP Executive Summary On IronWASP CYBER SECURITY & PRIVACY FOUNDATION 1 Software Product: IronWASP Description of the Product: IronWASP (Iron Web application Advanced Security testing Platform) is an open

More information

How to hack VMware vcenter server in 60 seconds

How to hack VMware vcenter server in 60 seconds Invest in security to secure investments How to hack VMware vcenter server in 60 seconds Alexander Minozhenko #whoami Pen-tester at Digital Security Researcher DCG#7812 / Zeronights CTF Thanks for ideas

More information

Web Application Security Considerations

Web Application Security Considerations Web Application Security Considerations Eric Peele, Kevin Gainey International Field Directors & Technology Conference 2006 May 21 24, 2006 RTI International is a trade name of Research Triangle Institute

More information

What is Web Security? Motivation

What is Web Security? Motivation [email protected] http://www.brucker.ch/ Information Security ETH Zürich Zürich, Switzerland Information Security Fundamentals March 23, 2004 The End Users View The Server Providers View What is Web

More information

SAP Secure Operations Map. SAP Active Global Support Security Services May 2015

SAP Secure Operations Map. SAP Active Global Support Security Services May 2015 SAP Secure Operations Map SAP Active Global Support Security Services May 2015 SAP Secure Operations Map Security Compliance Security Governance Audit Cloud Security Emergency Concept Secure Operation

More information

Integrigy Corporate Overview

Integrigy Corporate Overview mission critical applications mission critical security Application and Database Security Auditing, Vulnerability Assessment, and Compliance Integrigy Corporate Overview Integrigy Overview Integrigy Corporation

More information

Penetration Testing with Kali Linux

Penetration Testing with Kali Linux Penetration Testing with Kali Linux PWK Copyright 2014 Offensive Security Ltd. All rights reserved. Page 1 of 11 All rights reserved to Offensive Security, 2014 No part of this publication, in whole or

More information

EC-Council CAST CENTER FOR ADVANCED SECURITY TRAINING. CAST 619 Advanced SQLi Attacks and Countermeasures. Make The Difference CAST.

EC-Council CAST CENTER FOR ADVANCED SECURITY TRAINING. CAST 619 Advanced SQLi Attacks and Countermeasures. Make The Difference CAST. CENTER FOR ADVANCED SECURITY TRAINING 619 Advanced SQLi Attacks and Countermeasures Make The Difference About Center of Advanced Security Training () The rapidly evolving information security landscape

More information

SCP - Strategic Infrastructure Security

SCP - Strategic Infrastructure Security SCP - Strategic Infrastructure Security Lesson 1 - Cryptogaphy and Data Security Cryptogaphy and Data Security History of Cryptography The number lock analogy Cryptography Terminology Caesar and Character

More information

Security testing the Internet-of-things

Security testing the Internet-of-things Security testing the Internet-of-things Lindholmen Software Development Day 2014-10-16 Emilie Lundin Barse Informa(on Security Consultant, Combitech [email protected] Contents State of security

More information

Automating Security Testing. Mark Fallon Senior Release Manager Oracle

Automating Security Testing. Mark Fallon Senior Release Manager Oracle Automating Security Testing Mark Fallon Senior Release Manager Oracle Some Ground Rules There are no silver bullets You can not test security into a product Testing however, can help discover a large percentage

More information

Automated Penetration Testing with the Metasploit Framework. NEO Information Security Forum March 19, 2008

Automated Penetration Testing with the Metasploit Framework. NEO Information Security Forum March 19, 2008 Automated Penetration Testing with the Metasploit Framework NEO Information Security Forum March 19, 2008 Topics What makes a good penetration testing framework? Frameworks available What is the Metasploit

More information

Network Security and Firewall 1

Network Security and Firewall 1 Department/program: Networking Course Code: CPT 224 Contact Hours: 96 Subject/Course WEB Access & Network Security: Theoretical: 2 Hours/week Year Two Semester: Two Prerequisite: NET304 Practical: 4 Hours/week

More information

Mobile Applica,on and BYOD (Bring Your Own Device) Security Implica,ons to Your Business. Dmitry Dessiatnikov

Mobile Applica,on and BYOD (Bring Your Own Device) Security Implica,ons to Your Business. Dmitry Dessiatnikov Mobile Applica,on and BYOD (Bring Your Own Device) Security Implica,ons to Your Business Dmitry Dessiatnikov DISCLAIMER All informa,on in this presenta,on is provided for informa,on purposes only and in

More information

An Introduction to Network Vulnerability Testing

An Introduction to Network Vulnerability Testing CONTENTS Introduction 3 Penetration Testing Overview 4 Step 1: Defining the Scope 4 Step 2: Performing the Penetration Test 5 Step 3: Reporting and Delivering Results 6 VeriSign SecureTEST 7 Common Vulnerability

More information

Virtualization System Security

Virtualization System Security Virtualization System Security Bryan Williams, IBM X-Force Advanced Research Tom Cross, Manager, IBM X-Force Security Strategy 2009 IBM Corporation Overview Vulnerability disclosure analysis Vulnerability

More information

Assessing BYOD with the Smarthpone Pentest Framework. Georgia Weidman

Assessing BYOD with the Smarthpone Pentest Framework. Georgia Weidman Assessing BYOD with the Smarthpone Pentest Framework Georgia Weidman BYOD Is Not New Contractor Laptop Rogue Access Point Gaming Console Tradi>onal Vulnerability Scanning The iphone in Ques>on Is

More information

WHITE PAPER. FortiWeb and the OWASP Top 10 Mitigating the most dangerous application security threats

WHITE PAPER. FortiWeb and the OWASP Top 10 Mitigating the most dangerous application security threats WHITE PAPER FortiWeb and the OWASP Top 10 PAGE 2 Introduction The Open Web Application Security project (OWASP) Top Ten provides a powerful awareness document for web application security. The OWASP Top

More information

ABC LTD EXTERNAL WEBSITE AND INFRASTRUCTURE IT HEALTH CHECK (ITHC) / PENETRATION TEST

ABC LTD EXTERNAL WEBSITE AND INFRASTRUCTURE IT HEALTH CHECK (ITHC) / PENETRATION TEST ABC LTD EXTERNAL WEBSITE AND INFRASTRUCTURE IT HEALTH CHECK (ITHC) / PENETRATION TEST Performed Between Testing start date and end date By SSL247 Limited SSL247 Limited 63, Lisson Street Marylebone London

More information

Attack and Penetration Testing 101

Attack and Penetration Testing 101 Attack and Penetration Testing 101 Presented by Paul Petefish [email protected] July 15, 2009 Copyright 2000-2009, Solutionary, Inc. All rights reserved. Version 2.2 Agenda Penetration Testing

More information

Web App Security Audit Services

Web App Security Audit Services locuz.com Professional Services Web App Security Audit Services The unsecured world today Today, over 80% of attacks against a company s network come at the Application Layer not the Network or System

More information

Hardening of SAP HTTP- and Webservices

Hardening of SAP HTTP- and Webservices Hardening of SAP HTTP- and Webservices Sebastian Schinzel (Slides shamelessly stolen from by colleague Frederik Weidemann) Virtual Forge GmbH University of Mannheim Hardening of SAP HTTP- and Webservices

More information

Hardening of SAP HTTP- and Webservices

Hardening of SAP HTTP- and Webservices Hardening of SAP HTTP- and Webservices Frederik Weidemann Nürnberg 20.10.2010 Virtual Forge GmbH frederik.weidemann (at) virtualforge.de Copyright The Foundation Permission is granted to copy, distribute

More information

Why Web Applications are making a hackers life easy. Presented by Jon Grew BT SBS

Why Web Applications are making a hackers life easy. Presented by Jon Grew BT SBS Why Web Applications are making a hackers life easy. Presented by Jon Grew BT SBS Acknowledgements Ed Barlow Technical Director EMEA Ed sends his apologies. The following presentation is based on the talk

More information

NETWORK PENETRATION TESTING

NETWORK PENETRATION TESTING Tim West Consulting 6807 Wicklow St. Arlington, TX 76002 817-228-3420 [email protected] OVERVIEW Tim West Consulting Tim West Consulting is a full service IT security and support firm that specializes

More information

Adding Value to Automated Web Scans. Burp Suite and Beyond

Adding Value to Automated Web Scans. Burp Suite and Beyond Adding Value to Automated Web Scans Burp Suite and Beyond Automated Scanning vs Manual Tes;ng Manual Tes;ng Tools/Suites At MSU - QualysGuard WAS & Burp Suite Automated Scanning - iden;fy acack surface

More information

Security Guide SAP GUI for Windows

Security Guide SAP GUI for Windows Security Guide SAP GUI for Windows SAP GUI for Windows Release 7.30 SAP Technical Information June 2012 2 Contents 1. SAP GUI SECURITY MODULE... 4 1.1 SAP GUI SECURITY SETTINGS... 4 2.2 WHICH ACTIONS TRIGGERED

More information

CSE331: Introduction to Networks and Security. Lecture 32 Fall 2004

CSE331: Introduction to Networks and Security. Lecture 32 Fall 2004 CSE331: Introduction to Networks and Security Lecture 32 Fall 2004 Hackers / Intruders External attacks Typical hacker Exploits carried out remotely Does not have an account on the remote machine Insider

More information

How to scan/exploit a ssl based webserver. by xxradar. http://www.radarhack.com mailto:[email protected]. Version 1.

How to scan/exploit a ssl based webserver. by xxradar. http://www.radarhack.com mailto:xxradar@radarhack.com. Version 1. How to scan/exploit a ssl based webserver. by xxradar. http://www.radarhack.com mailto:[email protected]. Version 1.0 21-09-2003 1. Introduction Sometimes late at night, playing with openssl and connecting

More information

Please Complete Speaker Feedback Surveys. SecurityTube.net

Please Complete Speaker Feedback Surveys. SecurityTube.net Please Complete Speaker Feedback Surveys Advanced ios Applica:on Pentes:ng Vivek Ramachandran Founder, SecurityTube.net [email protected] Vivek Ramachandran B.Tech, ECE IIT Guwaha: Media Coverage

More information

Security Goals Services

Security Goals Services 1 2 Lecture #8 2008 Freedom from danger, risk, etc.; safety. Something that secures or makes safe; protection; defense. Precautions taken to guard against crime, attack, sabotage, espionage, etc. An assurance;

More information

Defending Against Web App A0acks Using ModSecurity. Jason Wood Principal Security Consultant Secure Ideas

Defending Against Web App A0acks Using ModSecurity. Jason Wood Principal Security Consultant Secure Ideas Defending Against Web App A0acks Using ModSecurity Jason Wood Principal Security Consultant Secure Ideas Background Info! Penetra?on Tester, Security Engineer & Systems Administrator!!!! Web environments

More information

Web Application Hacking (Penetration Testing) 5-day Hands-On Course

Web Application Hacking (Penetration Testing) 5-day Hands-On Course Web Application Hacking (Penetration Testing) 5-day Hands-On Course Web Application Hacking (Penetration Testing) 5-day Hands-On Course Course Description Our web sites are under attack on a daily basis

More information

NETWORK DEVICE SECURITY AUDITING

NETWORK DEVICE SECURITY AUDITING E-SPIN PROFESSIONAL BOOK VULNERABILITY MANAGEMENT NETWORK DEVICE SECURITY AUDITING ALL THE PRACTICAL KNOW HOW AND HOW TO RELATED TO THE SUBJECT MATTERS. NETWORK DEVICE SECURITY, CONFIGURATION AUDITING,

More information

Sample Report. Security Test Plan. Prepared by Security Innovation

Sample Report. Security Test Plan. Prepared by Security Innovation Sample Report Security Test Plan Prepared by Security Innovation Table of Contents 1.0 Executive Summary... 3 2.0 Introduction... 3 3.0 Strategy... 4 4.0 Deliverables... 4 5.0 Test Cases... 5 Automation...

More information

Barracuda Web Site Firewall Ensures PCI DSS Compliance

Barracuda Web Site Firewall Ensures PCI DSS Compliance Barracuda Web Site Firewall Ensures PCI DSS Compliance E-commerce sales are estimated to reach $259.1 billion in 2007, up from the $219.9 billion earned in 2006, according to The State of Retailing Online

More information

Locking down a Hitachi ID Suite server

Locking down a Hitachi ID Suite server Locking down a Hitachi ID Suite server 2016 Hitachi ID Systems, Inc. All rights reserved. Organizations deploying Hitachi ID Identity and Access Management Suite need to understand how to secure its runtime

More information

Security and Your SAP System When Working with Winshuttle Products

Security and Your SAP System When Working with Winshuttle Products Security and Your SAP System When Working with Winshuttle Products 2014 Winshuttle, LLC. All rights reserved. 2/14 www.winshuttle.com Background Companies running SAP systems are accustomed to configuring

More information

Learn Ethical Hacking, Become a Pentester

Learn Ethical Hacking, Become a Pentester Learn Ethical Hacking, Become a Pentester Course Syllabus & Certification Program DOCUMENT CLASSIFICATION: PUBLIC Copyrighted Material No part of this publication, in whole or in part, may be reproduced,

More information

SysPatrol - Server Security Monitor

SysPatrol - Server Security Monitor SysPatrol Server Security Monitor User Manual Version 2.2 Sep 2013 www.flexense.com www.syspatrol.com 1 Product Overview SysPatrol is a server security monitoring solution allowing one to monitor one or

More information

Web Application Security

Web Application Security E-SPIN PROFESSIONAL BOOK Vulnerability Management Web Application Security ALL THE PRACTICAL KNOW HOW AND HOW TO RELATED TO THE SUBJECT MATTERS. COMBATING THE WEB VULNERABILITY THREAT Editor s Summary

More information

Exploi'ng NoSQL Like Never Before HITB AMS 2014

Exploi'ng NoSQL Like Never Before HITB AMS 2014 Exploi'ng NoSQL Like Never Before HITB AMS 2014 About Me Independent Security Researcher Member @ OpenSecurity Currently Pursuing My Bachelors Degree (Amal Jyothi Colle Engineering) Spoken @ a couple of

More information

PERDIX: A FRAMEWORK FOR REALTIME BEHAVIORAL EVALUATION OF SECURITY THREATS IN CLOUD COMPUTING ENVIRONMENT

PERDIX: A FRAMEWORK FOR REALTIME BEHAVIORAL EVALUATION OF SECURITY THREATS IN CLOUD COMPUTING ENVIRONMENT PERDIX: A FRAMEWORK FOR REALTIME BEHAVIORAL EVALUATION OF SECURITY THREATS IN CLOUD COMPUTING ENVIRONMENT December 6, 2013 Julien Lavesque CTO Itrust [email protected] Security experts company founded

More information