Attacking the Giants: Exploiting SAP Internals
|
|
|
- Eugenia Greer
- 9 years ago
- Views:
Transcription
1 Attacking the Giants: Exploiting SAP Internals Mariano Nuñez Di Croce mnunez [at] cybsec [dot] com March 30, 2007 Blackhat Europe 07
2 Agenda SAP Connectivity SAP RFC Interface The RFC Library Security Review of the RFC Interface Implementation Advanced Attacks Tool Release: sapyto Conclusions Questions & Answers 2
3 SAP Connectivity 3
4 SAP Connectivity SAP Connectivity SAP is designed to be able to interact with many external systems. This way you can integrate and centralize information under a unique architecture. Communicating with other systems: ALE EDI HTTP RFC FTP XML... 4
5 SAP RFC Interface 5
6 SAP RFC Interface A Bit of History... In the beginning, SAP implemented IBM s CPI-C interface to communicate with other systems. CPI-C was developed to allow data transfer. Complex applications needed to be able to call functions on other servers. Result: SAP Remote Function Call (RFC) Interface. Developed in the 1980s, based on CPI-C. Today, the RFC Interface is a key component of the SAP Application Server. 6
7 SAP RFC Interface SAP Systems Layout 7
8 SAP RFC Interface RFC Between SAP Systems For a Function Module to be remotely-callable, it must be flagged as "Remote-enabled". ABAP Programs call a remote Function Module using the command CALL FUNCTION...DESTINATION..... CALL FUNCTION ZCUST_GETMONEY DESTINATION PROD2 EXPORTING ZCUST_ID = 100 IMPORTING MONEY = cust_money TABLES TABINFO = table1 EXCEPTIONS CUST_NOT_FOUND = 0 TABLE_EMPTY =
9 SAP RFC Interface RFC Between SAP Systems The DESTINATION parameter notifies the AS that it is a remote call. Specifically, DESTINATION is a index key to a RFC Destinations table (RFCDES), maintained through transaction SM59. 9
10 SAP RFC Interface The Gateway Server Communication is done through the Gateway Server. Handles communications between SAP systems and between SAP systems and External systems. Logically, it consists of three different services. Gateway Server Gateway Reader Gateway Work Process Gateway Monitor TCP/IP LU 6.2 External Program External Program Administration 10
11 SAP RFC Interface RFC Between SAP and External Systems External RFC Client External RFC Server External System SAP R/3 System SAP R/3 System External System Client Program Values G A T ABAP Function Module ABAP Program G A T Values Result Server Function 1 E E Result W A Y result W A Y Server Function 2 11
12 SAP RFC Interface External RFC Servers By default, client doesn t need to supply logon information. 2 Ways of "attaching" External RFC Servers: Started Mode Application Server starts them remotely on-demand. Commonly via Remote Shell or Remote Exec (!) External Server is closed after operation. Registered Mode External Server registers at the Gateway Server. Identified by a Program ID. External Server is not closed. But... How do you develop an external client / server?? 12
13 The RFC Library 13
14 The RFC Library The RFC Library "The RFC Library is the most commonly used and installed component of existing SAP software SAP RFCSDK Guide API released by SAP to allow development of external clients/servers. Available for all SAP supported platforms. Forward, backward and sideward compatible. An upper layer: JCo,.Net,... Very good documentation. Delivered with examples. 14
15 The RFC Library External RFC Server Internals First of all, the server install available functions: RfcInstallFunction(RFC_FUNCTIONNAME functionname, RFC_ONCALL f_ptr, rfc_char_t *docu); Listen and dispatch requests with RfcDispatch() loop. Requested function (f_ptr) is executed. Results are sent back to client. Three functions installed by default: RFC_DOCU RFC_PING RFC_SYSTEM_INFO 15
16 Security Review of the RFC Interface Implementation 16
17 Security Review of the RFC Interface... Traffic Analysis Information is sent in clear-text by default. SAP provides SNC (Secure Network Communications) for encryption of traffic. What can we get? Logon information. Called Function Name. Parameters Information and Content. Tables Information and Content (may be compressed). Client and Server information
18 Security Review of the RFC Interface... Traffic Analysis... 01a f 22 ea 45 5e..._".E^ 01b0 22 c5 10 e c0 a8 02 8b " c0 0a f rfc_server d b 81 bb 89.BCUSER... 01e0 62 fc b5 3e e b..?w.oy f E b b e 5a f d 4f 4e...ZCUST_GETMON f 22 ea 45 5e 22 c5 10 EY..._".E^" e c0 a8 02 8b c...CL e 54 5f IENT_ID...CUS ff ff ff ff T c e 80...>. 18
19 Security Review of the RFC Interface... Traffic Analysis: Show me the Password! You said that data is clear-text... but I can t see a single password! Reason: Password is obfuscated. for each CHAR in CLEAR_TEXT_PASS OBFUSCATED_PASS[i] = CHAR XOR KEY[i] KEY_TO_THE_KINGDOM = [0x96, 0xde, 0x51, 0x1e, 0x74, 0xe, 0x9, 0x9, 0x4, 0x1b, 0xd9, 0x46, 0x3c, 0x35, 0x4d, 0x8e, 0x55, 0xc5, 0xe5, 0xd4, 0xb, 0xa0, 0xdd, 0xd6, 0xf5, 0x21, 0x32, 0xf, 0xe2, 0xcd, 0x68, 0x4f, 0x1a, 0x50, 0x8f, 0x75, 0x54, 0x86, 0x3a, 0xbb] 19
20 Security Review of the RFC Interface... Function Analysis: RFC_DOCU Retrieves documentation about installed functions on External Server. Specifically, it outputs strings defined in the rfc_docu parameter of RfcInstallFunction() calls. No need for valid logon data. Available in External Systems. This function can be used to discover installed functions and their structure. 20
21 Security Review of the RFC Interface... Function Analysis: RFC_PING A RFC ping Connects to the target system, analyzing its availability. No need for valid logon data. Available in External Systems and R/3. This function can be used to check for availability of remote RFC Server. 21
22 Security Review of the RFC Interface... Function Analysis: RFC_SYSTEM_INFO Obtain RFC server system information. No need for logon data! Available in External Systems and R/3. What can we get? SAP Kernel Version Hostname Timezone Database Engine Database Host SAP System ID Operating System... 22
23 Security Review of the RFC Interface... Some Other Functions There are other functions installed by default in every external RFC server. We have discovered security vulnerabilities in some of them: RFC_TRUSTED_SYSTEM_SECURITY RFC_SET_REG_SERVER_PROPERTY RFC_START_GUI SYSTEM_CREATE_INSTANCE RFC_START_PROGRAM Any of this functions can be called, just as regular installed functions... 23
24 Security Review of the RFC Interface... Function Analysis: RFC_TRUSTED_SYSTEM_SECURITY Designed for internal use by SAP only. Available in External Systems. Impact: This function can be used to check existence of users and groups in an External system, its domain and trusted domains. 24
25 Security Review of the RFC Interface... Function Analysis: RFC_SET_REG_SERVER_PROPERTY Enables the definition of properties of External Registered Servers. Available in External Systems. Impact: Calling this function with a special parameter would render an External Registered Server unavailable to other clients (Denial of Service). 25
26 Security Review of the RFC Interface... Function Analysis: RFC_START_GUI Starts SAPGUI on FrontEnd systems. Available in External Systems. Impact: Calling this function with a specially crafted parameter would result in the ability to run remote arbitrary commands over the External Server system. 26
27 Security Review of the RFC Interface... Function Analysis: SYSTEM_CREATE_INSTANCE Enables the creation of remote objects, where an object adapter is available. Available in External Systems. Impact: Calling this function with a specially crafted parameter would result in the ability to run remote arbitrary commands over the External Server system. 27
28 Security Review of the RFC Interface... Function Analysis: RFC_START_PROGRAM Enables the execution of programs on External Servers. Commands are restricted by the RfcAllowStartProgram() function: No RfcAllowStartProgram() => Remote execution disabled RfcAllowStartProgram( foo.exe") => Execution of foo.exe" is authorized. RfcAllowStartProgram(NULL) => All commands are authorized. 28
29 Security Review of the RFC Interface... Function Analysis: RFC_START_PROGRAM (cont.) Impact: Calling the functions with specially crafted parameters would allow an attacker to: Obtain information about configuration of the remote server. Execute remote arbitrary commands, exploiting a buffer overflow vulnerability. 29
30 Security Review of the RFC Interface... Function Analysis: RFC_START_PROGRAM (cont.) What happens if RfcAllowStartProgram( dumbprogram.exe )? Analysis of RfcAllowStartProgram() revealed that only the first N bytes of incoming program are verified, where N is the length of the allowed program. You know an allowed program, you can execute another: dumbprogram.exe\..\..\..\path\to\evil\program.exe According to SAP, external server developers should validate against this type of attacks... 30
31 Security Review of the RFC Interface... RFCEXEC Bundled with the RFCSDK. Released as an example. Not intended for productive use. Installs the following functions: RFC_RAISE_ERROR RFC_MAIL RFC_REMOTE_PIPE RFC_REMOTE_FILE RFC_REMOTE_EXEC Protected through rfcexec.sec file directives. 31
32 Security Review of the RFC Interface... SAPXPG Executable shipped with SAP R/3 Application Server. Used for execution of external commands and programs. Installs the following functions: SAPXPG_END_XPG SAPXPG_START_XPG_LONG SAPXPG_START_XPG 32
33 Advanced Attacks 33
34 Advanced Attacks Attacks Setup Scenario: We need some information about current deployment. How do we get it? Network sniffing (RFC is clear-text!). The Gateway Monitor. Kidnapping an ABAP developer. (No step-by-step demonstration) 34
35 Advanced Attacks The Gateway Monitor The Gateway Server has a configuration parameter for controlling Gateway Monitor access. gw/monitor = 0 gw/monitor = 1 gw/monitor = 2 Monitor is disabled. Local access only. Remote access enabled. Up to SAP Kernels 6.20, default value for this parameter is: 2 Remote access to the Gateway Monitor would provide any information needed for the attacks. 35
36 Advanced Attacks Evil Twin Registration of External Servers can be done remotely. ACL for registration process is implemented through the reginfo file. By default, registration for everyone is allowed. (Registration Party!) External Servers can register several times with the same Program ID. ANY External Server can register with that ID! Attack: 1. Connect to licit Registered Server, ID=REG1 (blocking connections). 2. Register External Server with ID=REG1. 3. Drink some beer while watching calls arriving to our Evil Twin Server... 36
37 Advanced Attacks Evil Twin illustrated ID=REG1 External RFC Server SAP GW SAP R/3 - Legimate External RFC Server registers at SAP R/3 Gateway. 37
38 Advanced Attacks Evil Twin illustrated ID=REG1 External RFC Server SAP GW SAP R/3 - Legimate External RFC Server registers at SAP R/3 Gateway. - Innocent lamb connection establishment... 38
39 Advanced Attacks Evil Twin illustrated RCF Call ID=REG1 External RFC Server SAP GW SAP R/3 - Legimate External RFC Server registers at SAP R/3 Gateway. - Innocent lamb connection establishment... - Client performs RFC call and Server answers politely. 39
40 Advanced Attacks Evil Twin illustrated ID=REG1 External RFC Server SAP GW SAP R/3 - An external RFC malicious client/server appears in scene... (don t be afraid, it s controlled) - The attacker connects with the original RFC server, preventing him from serving requests from other clients. External RFC Malicius Server 40
41 Advanced Attacks Evil Twin illustrated ID=REG1 External RFC Server SAP GW ID=REG1 SAP R/3 - Now, the same malicious client/server connects with the SAP R/3 Gateway, registering itself with the same ID as the original external server External RFC Malicius Server 41
42 Advanced Attacks Evil Twin illustrated RCF Call ID=REG1 External RFC Server SAP GW ID=REG1 SAP R/3 - Now, the same malicious client/server connects with the SAP R/3 Gateway, registering itself with the same ID as the original external server - All future connections to the REG1 server will be attended by the evil one. External RFC Malicius Server 42
43 Advanced Attacks A Wiser (and Stealth) Evil Twin: MITM Attacks Proof of Concept. Attack: 1. Connect to licit Registered Server, ID=REG1 (blocking connections). 2. Register External Server with ID=REG1. 3. Receive RFC call. 4. Log / Modify Parameters values. 5. Use established connection with licit Registered Server to forward the (possible modified) RFC call. 6. Get results and send them to the original client. 7. Disconnect from the licit Registered Server. 8. Back to Step 1. 43
44 Advanced Attacks A Wiser (and Stealth) Evil Twin: MITM Attacks RESPONSE ID=REG1 External RFC Server SAP GW SAP R/3 - So we have the same scenario, legitimate client and External RFC Server, the SAP R/3 Server and the SAP Gateway 44
45 Advanced Attacks A Wiser (and Stealth) Evil Twin: MITM Attacks ID=REG1 External RFC Server SAP GW SAP R/3 Modified RESPONSE - Here we go again, blocking valid connections to the innocent External RCF Server External RFC Malicius Server 45
46 Advanced Attacks A Wiser (and Stealth) Evil Twin: MITM Attacks ID=REG1 External RFC Server SAP GW SAP R/3 ID=REG1 Modified RESPONSE - Here we go again, blocking valid connections to the innocent External RCF Server - Now, the same malicious client/server connects with the SAP R/3 Gateway, and register itself with the same ID as the original external server. External RFC Malicius Server 46
47 Advanced Attacks A Wiser (and Stealth) Evil Twin: MITM Attacks RCF Call ID=REG1 External RFC Server SAP GW ID=REG1 SAP R/3 - This time, every RFC call received is Logged/Modified, and forwarded to the original external server. External RFC Malicius Server 47
48 Advanced Attacks A Wiser (and Stealth) Evil Twin: MITM Attacks RCF Modified Call ID=REG1 External RFC Server SAP GW ID=REG1 SAP R/3 - This time, every RFC call received is Logged/Modified, and forwarded to the original external server. External RFC Malicius Server 48
49 Advanced Attacks Attacking the R/3 with a Registered Server RFC Interface allows client / servers to perform callbacks. RFC Client RFC Server Client Code Client Function 1 RFC Call RFC Call Send data Server Function 1 Send result 49
50 Advanced Attacks Attacking the R/3 with a Registered Server (cont.) We can perform callbacks to R/3 systems. The RFC Call is executed under the context of the original R/3 call. Impact depends on authorizations of the R/3 user (SAP_ALL?). Attack: 1. Connect to licit Registered Server, ID=REG1 (blocking connections). 2. Start an Evil Twin. 3. Receive RFC call. 4. Perform RFC callback. 5. If user has SAP_ALL...Bingo! 50
51 Advanced Attacks Attacking the R/3 with a Registered Server (cont.) RESPONSE ID=REG1 External RFC Server SAP GW SAP R/3 - Yes, again the same scenario: the valid client, the valid External RFC Server, the SAP R/3 Server and the SAP Gateway 51
52 Advanced Attacks Attacking the R/3 with a Registered Server (cont.) ID=REG1 External RFC Server SAP GW ID=REG1 SAP R/3 - Again, the same malicious client/server connects with the SAP R/3 server, and register itself with the ID of the original external server. External RFC Malicius Server 52
53 Advanced Attacks Attacking the R/3 with a Registered Server (cont.) RCF Call ID=REG1 External RFC Server SAP GW ID=REG1 SAP R/3 - But now, when a RFC call is received... External RFC Malicius Server 53
54 Advanced Attacks Attacking the R/3 with a Registered Server (cont.) Poisoned RCF Callback ID=REG1 External RFC Server SAP GW ID=REG1 SAP R/3 - But now, when a RFC call is received, we perform a callback... External RFC Malicius Server 54
55 Advanced Attacks Attacking the R/3 with a Registered Server (cont.) ID=REG1 External RFC Server SAP GW ID=REG1 SAP R/3 - But now, when a RFC call is received, we perform a callback - SAP R/3 Application Server OWNED!! External RFC Malicius Server 55
56 Tool Release: sapyto 56
57 Tool Release: sapyto sapyto First public framework for performing SAP Penetration Tests. Core dependencies: SAP RFC Library and saprfc module. Plugin based. Audit & Attack Plugins. Shipped with plugins for exploiting RFC vulnerabilities, auditing SAP R/3 configuration, launching described attacks, etc.. Developed in Python and C. 57
58 Tool Release: sapyto Available Plugins in Beta Version Audit: RFC Ping. Registration of External Servers. Detection of RFCEXEC. Detection of SAPXPG. Get system information. Get server documentation. 58
59 Tool Release: sapyto Available Plugins in Beta Version (cont.) Attack: RFC_START_PROGRAM Directory Trasversal. Run commands through RFCEXEC. Run commands through SAPXPG. StickShell. Evil Twin Attack. Get remote RFCShell. Tools: RFC Password Obfuscator / De-obfuscator. 59
60 Tool Release: sapyto sapyto Demonstration 60
61 Conclusions & Comments The RFC Interface is a wide door into SAP Systems. It has to be locked! SAP has responded quickly and provided solutions with SAP notes , , , and SAP Administrators must apply patches. SNC prevents credential and information sniffing. It is included in SAP systems and must be activated. Network must be properly segmented. Advanced attacks described can be avoided with proper configuration + patches. 61
62 Coming soon... Attacking SAP clients. SAP Backdoors. ABAP Worms. Exploiting Trusted Systems. RFC Fuzzer.... Stay tunned! 62
63 Questions? 63
64 Thank you! 64
SAP PENETRATION TESTING
A CYBSEC-Labs Publication by Mariano Nuñez Di Croce April 16, 2009 Abstract Penetration Testing has become an industry-proven effective methodology to analyze the security level of information systems
SAP Penetration Testing & Defense In-Depth
sap security, sap pentest, sap pentesting, sap pt, sap security assessment, sap vulnerability assessment, sap insecurity, sap vulnerabilities, sap vulnerability, sap defense, hardening sap, sap hardening,
Gateway Apps - Security Summary SECURITY SUMMARY
Gateway Apps - Security Summary SECURITY SUMMARY 27/02/2015 Document Status Title Harmony Security summary Author(s) Yabing Li Version V1.0 Status draft Change Record Date Author Version Change reference
ATTACKS TO SAP WEB APPLICATIONS
ATTACKS TO SAP WEB APPLICATIONS by Mariano Nuñez Di Croce [email protected] BlackHat DC 2011 Briefings Abstract "SAP platforms are only accessible internally". While that was true in many organizations
Members of the UK cyber security forum. Soteria Health Check. A Cyber Security Health Check for SAP systems
Soteria Health Check A Cyber Security Health Check for SAP systems Soteria Cyber Security are staffed by SAP certified consultants. We are CISSP qualified, and members of the UK Cyber Security Forum. Security
ArcGIS Server Security Threats & Best Practices 2014. David Cordes Michael Young
ArcGIS Server Security Threats & Best Practices 2014 David Cordes Michael Young Agenda Introduction Threats Best practice - ArcGIS Server settings - Infrastructure settings - Processes Summary Introduction
Top 10 most interesting SAP vulnerabilities and attacks Alexander Polyakov
Invest in security to secure investments Top 10 most interesting SAP vulnerabilities and attacks Alexander Polyakov CTO at ERPScan May 9, 2012 Me Business application security expert What is SAP? Shut
Thick Client Application Security
Thick Client Application Security Arindam Mandal ([email protected]) (http://www.paladion.net) January 2005 This paper discusses the critical vulnerabilities and corresponding risks in a two
SAP Cybersecurity Solution Brief. Objectives Solution Benefits Quick Facts
SAP Cybersecurity Solution Brief Objectives Solution Benefits Quick Facts Secure your SAP landscapes from cyber attack Identify and remove cyber risks in SAP landscapes Perform gap analysis against compliance
PUBLIC Secure Login for SAP Single Sign-On Implementation Guide
SAP Single Sign-On 2.0 SP04 Document Version: 1.0-2014-10-28 PUBLIC Secure Login for SAP Single Sign-On Implementation Guide Table of Contents 1 What Is Secure Login?....8 1.1 System Overview.... 8 1.1.1
SAP Secure Operations Map. SAP Active Global Support Security Services May 2015
SAP Secure Operations Map SAP Active Global Support Security Services May 2015 SAP Secure Operations Map Security Compliance Security Governance Audit Cloud Security Emergency Concept Secure Operation
IONA Security Platform
IONA Security Platform February 22, 2002 Igor Balabine, PhD IONA Security Architect Copyright IONA Technologies 2001 End 2 Anywhere Agenda IONA Security Platform (isp) architecture Integrating with Enterprise
FINAL DoIT 11.03.2015 - v.4 PAYMENT CARD INDUSTRY DATA SECURITY STANDARDS APPLICATION DEVELOPMENT AND MAINTENANCE PROCEDURES
Purpose: The Department of Information Technology (DoIT) is committed to developing secure applications. DoIT s System Development Methodology (SDM) and Application Development requirements ensure that
My FreeScan Vulnerabilities Report
Page 1 of 6 My FreeScan Vulnerabilities Report Print Help For 66.40.6.179 on Feb 07, 008 Thank you for trying FreeScan. Below you'll find the complete results of your scan, including whether or not the
Hacking Database for Owning your Data
Hacking Database for Owning your Data 1 Introduction By Abdulaziz Alrasheed & Xiuwei Yi Stealing data is becoming a major threat. In 2012 alone, 500 fortune companies were compromised causing lots of money
Configuring Java IDoc Adapter (IDoc_AAE) in Process Integration. : SAP Labs India Pvt.Ltd
Configuring Java IDoc Adapter (IDoc_AAE) in Process Integration Author Company : Syed Umar : SAP Labs India Pvt.Ltd TABLE OF CONTENTS INTRODUCTION... 3 Preparation... 3 CONFIGURATION REQUIRED FOR SENDER
The SAProuter An Internet Window to your SAP Platform (and beyond)
The SAProuter An Internet Window to your SAP Platform (and beyond) July 2, 2010 HITBSecConf, Amsterdam Disclaimer This publication is copyright 2010 Onapsis SRL All rights reserved. No portion of this
Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs
Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs Why Network Security? Keep the bad guys out. (1) Closed networks
Secure Web Application Coding Team Introductory Meeting December 1, 2005 1:00 2:00PM Bits & Pieces Room, Sansom West Room 306 Agenda
Secure Web Application Coding Team Introductory Meeting December 1, 2005 1:00 2:00PM Bits & Pieces Room, Sansom West Room 306 Agenda 1. Introductions for new members (5 minutes) 2. Name of group 3. Current
CS5008: Internet Computing
CS5008: Internet Computing Lecture 22: Internet Security A. O Riordan, 2009, latest revision 2015 Internet Security When a computer connects to the Internet and begins communicating with others, it is
Security and Your SAP System When Working with Winshuttle Products
Security and Your SAP System When Working with Winshuttle Products 2014 Winshuttle, LLC. All rights reserved. 2/14 www.winshuttle.com Background Companies running SAP systems are accustomed to configuring
Directory and File Transfer Services. Chapter 7
Directory and File Transfer Services Chapter 7 Learning Objectives Explain benefits offered by centralized enterprise directory services such as LDAP over traditional authentication systems Identify major
Processed on SAP Solution Manager Service Center Release EHP 1 for Solution Manager 7.0 Telephone Service Tool 701_2011_1 SP0 Fax
SERVICE REPORT SAP Security Optimization Self-Service SAP System ID SAP Product Release DB System Customer Processed on SAP Solution Manager Service Center Release EHP 1 for Solution Manager 7.0 Telephone
SAP WEB DISPATCHER Helps you to make decisions on Web Dispatcher implementation
A BasisOnDemand.com White Paper SAP WEB DISPATCHER Helps you to make decisions on Web Dispatcher implementation by Prakash Palani Table of Contents 1. Purpose... 3 2. What is Web Dispatcher?... 3 3. Can
Security Technical. Overview. BlackBerry Enterprise Service 10. BlackBerry Device Service Solution Version: 10.2
BlackBerry Enterprise Service 10 BlackBerry Device Service Solution Version: 10.2 Security Technical Overview Published: 2014-09-10 SWD-20140908123239883 Contents 1 About BlackBerry Device Service solution
4. Getting started: Performing an audit
4. Getting started: Performing an audit Introduction Security scans enable systems administrators to identify and assess possible risks within a network. Through GFI LANguard N.S.S. this is performed automatically,
Hands-On Ethical Hacking and Network Defense Second Edition Chapter 8 Desktop and Server OS Vulnerabilities
Objectives After reading this chapter and completing the exercises, you will be able to: Describe vulnerabilities of Windows and Linux operating systems Identify specific vulnerabilities and explain ways
Using Device Discovery
2 CHAPTER You can use Active Discovery to scan your network for new monitors (Active Monitors and Performance Monitors) and devices on a regular basis. Newly discovered items are added to the Active Discovery
Absolute Backdoor Revisited. Vitaliy Kamlyuk, Kaspersky Lab Sergey Belov, Kaspersky Lab Anibal Sacco, Cubica Labs
Absolute Backdoor Revisited Vitaliy Kamlyuk, Kaspersky Lab Sergey Belov, Kaspersky Lab Anibal Sacco, Cubica Labs BlackHat, Las Vegas August, 2014 What is Computrace? Computrace is an Anti-Theft software
Web App Security Audit Services
locuz.com Professional Services Web App Security Audit Services The unsecured world today Today, over 80% of attacks against a company s network come at the Application Layer not the Network or System
OpenChange overview and current server implementation
OpenChange overview and current server implementation 1 Introduction What is OpenChange? + Open Source implementation of Microsoft Exchange protocols under unix/linux + Exchange server replacement under
SY0-201. system so that an unauthorized individual can take over an authorized session, or to disrupt service to authorized users.
system so that an unauthorized individual can take over an authorized session, or to disrupt service to authorized users. From a high-level standpoint, attacks on computer systems and networks can be grouped
Sitefinity Security and Best Practices
Sitefinity Security and Best Practices Table of Contents Overview The Ten Most Critical Web Application Security Risks Injection Cross-Site-Scripting (XSS) Broken Authentication and Session Management
Microsoft Dynamics GP Release
Microsoft Dynamics GP Release Workflow Installation and Upgrade Guide February 17, 2011 Copyright Copyright 2011 Microsoft. All rights reserved. Limitation of liability This document is provided as-is.
Configuring Security Features of Session Recording
Configuring Security Features of Session Recording Summary This article provides information about the security features of Citrix Session Recording and outlines the process of configuring Session Recording
Cisco Configuring Commonly Used IP ACLs
Table of Contents Configuring Commonly Used IP ACLs...1 Introduction...1 Prerequisites...2 Hardware and Software Versions...3 Configuration Examples...3 Allow a Select Host to Access the Network...3 Allow
Worms, Trojan Horses and Root Kits
Worms, Trojan Horses and Root Kits Worms A worm is a type of Virus that is capable of spreading and replicating itself autonomously over the internet. Famous Worms Morris Internet worm (1988) Currently:
WS_FTP Server. User s Guide. Software Version 3.1. Ipswitch, Inc.
User s Guide Software Version 3.1 Ipswitch, Inc. Ipswitch, Inc. Phone: 781-676-5700 81 Hartwell Ave Web: http://www.ipswitch.com Lexington, MA 02421-3127 The information in this document is subject to
Software security. Buffer overflow attacks SQL injections. Lecture 11 EIT060 Computer Security
Software security Buffer overflow attacks SQL injections Lecture 11 EIT060 Computer Security Buffer overflow attacks Buffer overrun is another common term Definition A condition at an interface under which
SAP. Penetration Testing. with Onapsis Bizploit. Mariano Nuñez. Di Croce. HITB Security Conference, Dubai. April 22, 2010. mnunez@onapsis.
SAP Penetration Testing with Onapsis Bizploit Mariano Nuñez Di Croce [email protected] April 22, 2010 HITB Security Conference, Dubai Disclaimer This publication is copyright Onapsis SRL 2010 All rights
SAP R/3 Security Assessment Framework
NII CONSULTING SAP R/3 Security Assessment Framework Version 1.0 N E T W O R K I N T E L L I G E N C E (IN D I A ) P VT. L TD. Contents Objective... 3 Methodology... 4 Phase 1: User Authentication... 4
Exploiting Transparent User Identification Systems
Exploiting Transparent User Identification Systems Wayne Murphy Benjamin Burns Version 1.0a 1 CONTENTS 1.0 Introduction... 3 1.1 Project Objectives... 3 2.0 Brief Summary of Findings... 4 3.0 Background
Evading Infrastructure Security Mohamed Bedewi Penetration Testing Consultant
Evading Infrastructure Security Mohamed Bedewi Penetration Testing Consultant What infrastructure security really means? Infrastructure Security is Making sure that your system services are always running
SSL VPN. Virtual Appliance Installation Guide. Virtual Private Networks
SSL VPN Virtual Appliance Installation Guide Virtual Private Networks C ONTENTS Introduction... 2 Installing the Virtual Appliance... 2 Configuring Appliance Operating System Settings... 3 Setting up the
Network Access Control ProCurve and Microsoft NAP Integration
HP ProCurve Networking Network Access Control ProCurve and Microsoft NAP Integration Abstract...2 Foundation...3 Network Access Control basics...4 ProCurve Identity Driven Manager overview...5 Microsoft
SAP Netweaver Application Server and Netweaver Portal Security
VU University Amsterdam SAP Netweaver Application Server and Netweaver Portal Security Author: Nick Kirtley Supervisors: Abbas Shahim, Frank Hakkennes Date: 28-09-2012 Organization: VU University Amsterdam,
PINsafe Multifactor Authentication Solution. Technical White Paper
PINsafe Multifactor Authentication Solution Technical White Paper Abstract PINsafe is a flexible authentication solution that offers a wide range of authentication models. The use of the patented one-time
1. LAB SNIFFING LAB ID: 10
H E R A LAB ID: 10 SNIFFING Sniffing in a switched network ARP Poisoning Analyzing a network traffic Extracting files from a network trace Stealing credentials Mapping/exploring network resources 1. LAB
WHITEPAPER. Nessus Exploit Integration
Nessus Exploit Integration v2 Tenable Network Security has committed to providing context around vulnerabilities, and correlating them to other sources, such as available exploits. We currently pull information
BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note
BlackBerry Enterprise Service 10 Secure Work Space for ios and Android Version: 10.1.1 Security Note Published: 2013-06-21 SWD-20130621110651069 Contents 1 About this guide...4 2 What is BlackBerry Enterprise
Connection Broker Managing User Connections to Workstations and Blades, OpenStack Clouds, VDI, and more. Security Review
Connection Broker Managing User Connections to Workstations and Blades, OpenStack Clouds, VDI, and more Security Review Version 8.1 March 31, 2016 Contacting Leostream Leostream Corporation http://www.leostream.com
SSO Methods Supported by Winshuttle Applications
Winshuttle and SSO SSO Methods Supported by Winshuttle Applications Single Sign-On (SSO) delivers business value by enabling safe, secure access to resources and exchange of information at all levels of
The Trivial Cisco IP Phones Compromise
Security analysis of the implications of deploying Cisco Systems SIP-based IP Phones model 7960 Ofir Arkin Founder The Sys-Security Group [email protected] http://www.sys-security.com September 2002
Windows Remote Access
Windows Remote Access A newsletter for IT Professionals Education Sector Updates Issue 1 I. Background of Remote Desktop for Windows Remote Desktop Protocol (RDP) is a proprietary protocol developed by
WIZnet S2E (Serial-to-Ethernet) Device s Configuration Tool Programming Guide
WIZnet S2E (Serial-to-Ethernet) Device s Configuration Tool Programming Guide Rev 0.2 This document describes how to make your own Configuration Tool for WIZ100SR, WIZ105SR and WIZ110SR of WIZnet. And
IBM Managed Security Services Vulnerability Scanning:
IBM Managed Security Services August 2005 IBM Managed Security Services Vulnerability Scanning: Understanding the methodology and risks Jerry Neely Network Security Analyst, IBM Global Services Page 2
Toolbox 3.3 Client-Server Configuration. Quick configuration guide. User manual. For the latest news. and the most up-todate.
User manual Toolbox 3.3 Client-Server Configuration Quick configuration guide For the latest news and the most up-todate information, please consult the Document history Version Comment Version 1.0 30/10/2010,
Network and Host-based Vulnerability Assessment
Network and Host-based Vulnerability Assessment A guide for information systems and network security professionals 6600 Peachtree-Dunwoody Road 300 Embassy Row Atlanta, GA 30348 Tel: 678.443.6000 Toll-free:
Configuration Guide. SafeNet Authentication Service. SAS Agent for Microsoft Outlook Web App. Technical Manual Template
SafeNet Authentication Service Configuration Guide Technical Manual Template Release 1.0, PN: 000-000000-000, Rev. A, March 2013, Copyright 2013 SafeNet, Inc. All rights reserved. 1 Document Information
Considerations In Developing Firewall Selection Criteria. Adeptech Systems, Inc.
Considerations In Developing Firewall Selection Criteria Adeptech Systems, Inc. Table of Contents Introduction... 1 Firewall s Function...1 Firewall Selection Considerations... 1 Firewall Types... 2 Packet
Application Intrusion Detection
Application Intrusion Detection Drew Miller Black Hat Consulting Application Intrusion Detection Introduction Mitigating Exposures Monitoring Exposures Response Times Proactive Risk Analysis Summary Introduction
/ Preparing to Manage a VMware Environment Page 1
Configuring Security for a Managed VMWare Enviroment in VMM Preparing to Manage a VMware Environment... 2 Decide Whether to Manage Your VMware Environment in Secure Mode... 2 Create a Dedicated Account
Guideline for setting up a functional VPN
Guideline for setting up a functional VPN Why do I want a VPN? VPN by definition creates a private, trusted network across an untrusted medium. It allows you to connect offices and people from around the
Web Application Threats and Vulnerabilities Web Server Hacking and Web Application Vulnerability
Web Application Threats and Vulnerabilities Web Server Hacking and Web Application Vulnerability WWW Based upon HTTP and HTML Runs in TCP s application layer Runs on top of the Internet Used to exchange
Performance Evaluation of Intrusion Detection Systems
Performance Evaluation of Intrusion Detection Systems Waleed Farag & Sanwar Ali Department of Computer Science at Indiana University of Pennsylvania ABIT 2006 Outline Introduction: Intrusion Detection
TOSHIBA GA-1310. Printing from Windows
TOSHIBA GA-1310 Printing from Windows 2009 Electronics for Imaging, Inc. The information in this publication is covered under Legal Notices for this product. 45081979 04 February 2009 CONTENTS 3 CONTENTS
Security from the Ground Up eblvd uses a hybrid-asp model designed expressly to ensure robust, secure operation.
eblvd enables secure, cloud-based access to a PC or server over the Internet. Data, keyboard, mouse and display updates are transmitted over a highly compressed, encrypted stream, yielding "as good as
Advanced Administration for Citrix NetScaler 9.0 Platinum Edition
Advanced Administration for Citrix NetScaler 9.0 Platinum Edition Course Length: 5 Days Course Code: CNS-300 Course Description This course provides the foundation to manage, configure and monitor advanced
BASIC ANALYSIS OF TCP/IP NETWORKS
BASIC ANALYSIS OF TCP/IP NETWORKS INTRODUCTION Communication analysis provides powerful tool for maintenance, performance monitoring, attack detection, and problems fixing in computer networks. Today networks
PaperCut Payment Gateway Module - RBS WorldPay Quick Start Guide
PaperCut Payment Gateway Module - RBS WorldPay Quick Start Guide This guide is designed to supplement the Payment Gateway Module documentation and provides a guide to installing, setting up and testing
Remote DNS Cache Poisoning Attack Lab
SEED Labs Remote DNS Cache Poisoning Attack Lab 1 Remote DNS Cache Poisoning Attack Lab Copyright c 2014 Wenliang Du, Syracuse University. The development of this document is/was funded by the following
iscsi Security (Insecure SCSI) Presenter: Himanshu Dwivedi
iscsi Security (Insecure SCSI) Presenter: Himanshu Dwivedi Agenda Introduction iscsi Attacks Enumeration Authorization Authentication iscsi Defenses Information Security Partners (isec) isec Partners Independent
Metastorm BPM Interwoven Integration. Process Mapping solutions. Metastorm BPM Interwoven Integration. Introduction. The solution
Metastorm BPM Interwoven Integration Introduction A proven and cost effective solution for companies that need to create and maintain high volumes of Interwoven WorkSpaces and their associated documents
Pension Benefit Guaranty Corporation. Office of Inspector General. Evaluation Report. Penetration Testing 2001 - An Update
Pension Benefit Guaranty Corporation Office of Inspector General Evaluation Report Penetration Testing 2001 - An Update August 28, 2001 2001-18/23148-2 Penetration Testing 2001 An Update Evaluation Report
Pcounter Mobile Guide
Pcounter Mobile Guide Pcounter Mobile Guide 2012.06.22 Page 1 of 19 1. Overview... 3 2. Pre-requisites and Requirements... 4 2.1 Gateway server requirements... 4 2.2 Mobile device requirements... 4 2.3
If you prefer to use your own SSH client, configure NG Admin with the path to the executable:
How to Configure SSH Each Barracuda NG Firewall system is routinely equipped with an SSH daemon listening on TCP port 22 on all administrative IP addresses (the primary box IP address and all other IP
Requirements & Install. Module 2 Single Engine Installation
Requirements & Install Module 2 Single Engine Installation Requirements Requirement Minimum Optimum Processor Intel Core 2 @ 2GHz Dual Processor Xeon 3.0 GHz Memory 2 GB RAM 8 GB RAM Disk Space 2 GB 5GB
Step- by- Step guide to extend Credential Sync between IBM WebSphere Portal 8.5 credential vault and Active Directory 2012 using Security Directory
Step- by- Step guide to extend Credential Sync between IBM WebSphere Portal 8.5 credential vault and Active Directory 2012 using Security Directory Integrator (ex TDI) on Red- Hat (part 3) Summary STEP-
StreamServe Persuasion SP4 StreamServe Connect for SAP - Business Processes
StreamServe Persuasion SP4 StreamServe Connect for SAP - Business Processes User Guide Rev A StreamServe Persuasion SP4StreamServe Connect for SAP - Business Processes User Guide Rev A SAP, mysap.com,
ABC LTD EXTERNAL WEBSITE AND INFRASTRUCTURE IT HEALTH CHECK (ITHC) / PENETRATION TEST
ABC LTD EXTERNAL WEBSITE AND INFRASTRUCTURE IT HEALTH CHECK (ITHC) / PENETRATION TEST Performed Between Testing start date and end date By SSL247 Limited SSL247 Limited 63, Lisson Street Marylebone London
USB Card Reader Configuration Utility. User Manual. Draft!
USB Card Reader Configuration Utility User Manual Draft! SB Research 2009 The Configuration Utility for USB card reader family: Concept: To allow for field programming of the USB card readers a configuration
Second-generation (GenII) honeypots
Second-generation (GenII) honeypots Bojan Zdrnja CompSci 725, University of Auckland, Oct 2004. [email protected] Abstract Honeypots are security resources which trap malicious activities, so they
The Weakest Link: Mitigating Web Application Vulnerabilities. webscurity White Paper. webscurity Inc. Minneapolis, Minnesota USA
The Weakest Link: Mitigating Web Application Vulnerabilities webscurity White Paper webscurity Inc. Minneapolis, Minnesota USA January 25, 2007 Contents Executive Summary...3 Introduction...4 Target Audience...4
1 hours, 30 minutes, 38 seconds Heavy scan. All scanned network resources. Copyright 2001, FTP access obtained
home Network Vulnerabilities Detail Report Grouped by Vulnerability Report Generated by: Symantec NetRecon 3.5 Licensed to: X Serial Number: 0182037567 Machine Scanned from: ZEUS (192.168.1.100) Scan Date:
3. Broken Account and Session Management. 4. Cross-Site Scripting (XSS) Flaws. Web browsers execute code sent from websites. Account Management
What is an? s Ten Most Critical Web Application Security Vulnerabilities Anthony LAI, CISSP, CISA Chapter Leader (Hong Kong) [email protected] Open Web Application Security Project http://www.owasp.org
Lecture 15 - Web Security
CSE497b Introduction to Computer and Network Security - Spring 2007 - Professor Jaeger Lecture 15 - Web Security CSE497b - Spring 2007 Introduction Computer and Network Security Professor Jaeger www.cse.psu.edu/~tjaeger/cse497b-s07/
Bypassing CAPTCHAs by Impersonating CAPTCHA Providers
Bypassing CAPTCHAs by Impersonating CAPTCHA Providers Author: Gursev Singh Kalra Principal Consultant Foundstone Professional Services Table of Contents Bypassing CAPTCHAs by Impersonating CAPTCHA Providers...
SECURITY TRENDS & VULNERABILITIES REVIEW 2015
SECURITY TRENDS & VULNERABILITIES REVIEW 2015 Contents 1. Introduction...3 2. Executive summary...4 3. Inputs...6 4. Statistics as of 2014. Comparative study of results obtained in 2013...7 4.1. Overall
2. From a control perspective, the PRIMARY objective of classifying information assets is to:
MIS5206 Week 13 Your Name Date 1. When conducting a penetration test of an organization's internal network, which of the following approaches would BEST enable the conductor of the test to remain undetected
What IT Auditors Need to Know About Secure Shell. SSH Communications Security
What IT Auditors Need to Know About Secure Shell SSH Communications Security Agenda Secure Shell Basics Security Risks Compliance Requirements Methods, Tools, Resources What is Secure Shell? A cryptographic
IPS Attack Protection Configuration Example
IPS Attack Protection Configuration Example Keywords: IPS Abstract: This document presents a configuration example for the attack protection feature of the IPS devices. Acronyms: Acronym Full spelling
International Journal of Enterprise Computing and Business Systems ISSN (Online) : 2230-8849
WINDOWS-BASED APPLICATION AWARE NETWORK INTERCEPTOR Ms. Shalvi Dave [1], Mr. Jimit Mahadevia [2], Prof. Bhushan Trivedi [3] [1] Asst.Prof., MCA Department, IITE, Ahmedabad, INDIA [2] Chief Architect, Elitecore
Click Studios. Passwordstate. Password Discovery, Reset and Validation. Requirements
Passwordstate Password Discovery, Reset and Validation Requirements This document and the information controlled therein is the property of Click Studios. It must not be reproduced in whole/part, or otherwise
Implementing Secure Converged Wide Area Networks (ISCW)
Implementing Secure Converged Wide Area Networks (ISCW) 1 Mitigating Threats and Attacks with Access Lists Lesson 7 Module 5 Cisco Device Hardening 2 Module Introduction The open nature of the Internet
Walton Centre. Document History Date Version Author Changes 01/10/04 1.0 A Cobain L Wyatt 31/03/05 1.1 L Wyatt Update to procedure
Page 1 Walton Centre Access and Authentication (network) Document History Date Version Author Changes 01/10/04 1.0 A Cobain L Wyatt 31/03/05 1.1 L Wyatt Update to procedure Page 2 Table of Contents Section
Remote Administration
Windows Remote Desktop, page 1 pcanywhere, page 3 VNC, page 7 Windows Remote Desktop Remote Desktop permits users to remotely execute applications on Windows Server 2008 R2 from a range of devices over
Taxonomic Modeling of Security Threats in Software Defined Networking
Taxonomic Modeling of Security Threats in Software Defined Networking Recent advances in software defined networking (SDN) provide an opportunity to create flexible and secure next-generation networks.
Release Notes for Epilog for Windows Release Notes for Epilog for Windows v1.7/v1.8
Release Notes for Epilog for Windows v1.7/v1.8 InterSect Alliance International Pty Ltd Page 1 of 22 About this document This document provides release notes for Snare Enterprise Epilog for Windows release
NAT TCP SIP ALG Support
The feature allows embedded messages of the Session Initiation Protocol (SIP) passing through a device that is configured with Network Address Translation (NAT) to be translated and encoded back to the
