SAP Penetration Testing & Defense In-Depth

Size: px
Start display at page:

Download "SAP Penetration Testing & Defense In-Depth"

Transcription

1 sap security, sap pentest, sap pentesting, sap pt, sap security assessment, sap vulnerability assessment, sap insecurity, sap vulnerabilities, sap vulnerability, sap defense, hardening sap, sap hardening, protecting sap SAP Penetration Testing & Defense In-Depth Mariano Nuñez Di Croce October 2-3, 2008 Ekoparty,, Buenos Aires - Argentina Copyright 2008 CYBSEC. All rights reserved.

2 Who is CYBSEC? Provides Information Security services since More than 300 customers, located in LatinAmerica, USA and Europe. Wide range of services: Strategic Management, Operation Management, Control Management, Incident Management, PCI Services, SAP Security. SAP & CYBSEC Member of the SAP Global Security Alliance (GSA). Has been working with SAP (Walldorf) since Provides specific SAP security services (Penetration Testing, Secure Architecture Design, Secure Configuration, ) 2

3 Who am I? Senior Security Researcher at CYBSEC. Devoted to Penetration Testing and Vulnerability Research. Discovered vulnerabilities in Microsoft, Oracle, SAP, Watchfire, Speaker/Trainer at Blackhat, Sec-T, Hack.lu, DeepSec, Ekoparty, CIBSI, SAP & Me Started researching in SAP Pentesting projects (customers). Discovered more than 40 vulnerabilities in SAP software. Published Attacking the Giants: Exploiting SAP Internals. Developed sapyto, the first SAP Penetration Testing Framework. CYBSEC s SAP (In)Security Training instructor. 3

4 Agenda Agenda Introduction to the SAP World Why SAP Penetration Testing? PenTest Setup SAP PenTesting Discovery Phase Exploration Phase Vulnerability Assessment Phase Exploitation Phase Case Study: SAProuter Security Assessment Conclusions 4

5 Introduction to the SAP World Basic concepts for deep knowledge 5

6 Introduction to the SAP World So what is SAP? SAP (Systems, Applications and Products in Data Processing) is a german company devoted to the development of business solutions. More than customers in more than 120 countries. More than SAP implementations around the globe. Third biggest independent software vendor (ISV). Provides different solutions: CRM, ERP, PLM, SCM, SRM, GRC, Business One, The ERP solution is composed of different functional modules (FI, CO, SD, HR, MM, etc) that implements organization business processes. Modules are linked together, integrated by the Netweaver platform. SAP runs on multiple Operating Systems and Databases. 6

7 Introduction to the SAP World SAP Basic Concepts Instance & System An instance is an administrative entity which groups related components of an SAP system, providing one or more services. Systems are identified by SAP System ID (SID). System (instance) parametrization is done in Profiles. 7

8 Introduction to the SAP World SAP Basic Concepts Client Legally and organizationally independent unit in an SAP system (company group, business unit, corporation). Identified by a three-digit number. Default clients: 000, 001 and 066. Transaction Related secuence of steps (dialog steps) aimed to perform an operation in the SAP database. Identified by a transaction code (ej: SU01, SE16, FK01, PA20, ) 8

9 Introduction to the SAP World SAP Basic Concepts ABAP ABAP is the SAP high-level programming language used to develop business applications. Reports / Programs ABAP programs that receive user input and produce a report in the form of an interactive list. Function Modules Independent ABAP modules. Can be called locally or remotely. The RFC (Remote Function Call) Interface Used to call function modules on remote systems. 9

10 Introduction to the SAP World SAP Basic Concepts The Authorization Concept (Simplified) Users are asigned roles/profiles. Each profile contains a set of Authorization objects. When a user tries to perform an activity, the required authorization objects are checked against user s authorization objects (user buffer). Controlled Activities: Starting Transactions (S_TCODE) Accessing Tables (S_TABU_DIS) Starting Programs (S_PROGRAM) Calling RFC Function Modules (S_RFC) Authorization checks can also be done programatically, through the AUTHORITY_CHECK clause. 10

11 Introduction to the SAP World Some Low Low-level level Knowledge SAP_ALL profile = SAP God. Many other profiles may enable a user become a god too. Each SAP System uses its own Database. SAP processes run under the <sid>adm or SAPService<SID> user accounts. Connections to the Database are done with the same UID. No authorization at this level Direct access to the Database means full SAP compromise! Connections between systems often based on Trust Relationships (r* services). Many customer s interfaces are implemented through FTP (cleartext, usually weak passwords). 11

12 Why SAP Penetration Testing? Or why You and your CFO should care 12

13 Why SAP Penetration Testing? Why do you Need an SAP Penetration Test? The new SAP system must be running on October 3 rd, no excuses. 13

14 Why SAP Penetration Testing? Why do you Need an SAP Penetration Test? But we haven t secured the systems yet you know, there is something called Security The new SAP system must be running on October 3 rd, no excuses. 14

15 Why SAP Penetration Testing? Why do you Need an SAP Penetration Test? But we haven t secured the systems yet you know, there is something called The new SAP system must be running on October 3 rd, no excuses. Security Security? Hmm is it French? I don t care Business *must* go on! 15

16 Why SAP Penetration Testing? Why do you Need an SAP Penetration Test? But we haven t secured the systems yet you know, there is something called The new SAP system must be running on October 3 rd, no excuses. Security Security? Hmm is it French? But we should take care of I don t care User authorizations to Business *must* go on! prevent frauds! 16

17 Why SAP Penetration Testing? Why do you Need an SAP Penetration Test? But we haven t secured the systems yet you know, there is something called The new SAP system must be running on October 3 rd, no excuses. Security Security? Hmm is it French? But we should take care of I don t care User authorizations to Business *must* go on! prevent frauds! Just give everyone full access (SAP_ALL) for three months, then we ll lock it down 17

18 Why SAP Penetration Testing? Why do you Need an SAP Penetration Test? But we haven t secured the systems yet you know, there is something called The new SAP system must be running on October 3 rd, no excuses. Security Security? Hmm is it French? But we should take care of I don t care User authorizations to Business *must* go on! prevent frauds! Just give everyone full access OK (SAP_ALL) for three months, then we ll lock it down 18

19 Why SAP Penetration Testing? Why do you Need an SAP Penetration Test? But we haven t secured the systems yet you know, there is something called The new SAP system must be running on October 3 rd, no excuses. Security Security? Hmm is it French? But we should take care of I don t care User authorizations to Business *must* go on! prevent OK Just give everyone full access (SAP_ALL) for three months, then we ll lock it down 19

20 Why SAP Penetration Testing? Why do you Need an SAP Penetration Test? (cont.) CFO s Mistake: Alert Weak SAP Security configuration can definitely result in Business Frauds! Security guy s Mistake: Alert SAP Security is much (*much*) more than User roles and authorizations! 20

21 Why SAP Penetration Testing? Why do you Need an SAP Penetration Test? (Wrap up) Security configurations of SAP systems are usually left by default. By default, many configurations are not secure. Conclusion: Many SAP implementations are not secure! Is yours secure? A Penetration Test to these systems will help you know how your SAP implementation can be attacked and which is the real impact of this. It will help you discover the weaknesses, secure them, and increase the security level of your systems (a.k.a decrease fraud risk). In this talk, we ll see some of the activities that make up the different phases of an SAP Penetration Testing (no way of covering them all). 21

22 PenTest Setup Before we begin 22

23 PenTest Setup Preparation What do you need? The Shopping List sapyto SMB client & security tools nmap BurpSuite / w3af r* tools (rsh, rlogin, rexec) Nessus SQL client tools john (patched) NFS client tools hydra Try to get as much information as possible about target platforms, usage and policies before starting the assessment. Remember that everthing that breaks while you are pentesting *will* be your fault (even if someone breaks his leg). 23

24 sapyto sapyto First SAP Penetration Testing Framework. Support for activities in all phases of the pentest. Open-source (and free). Plugin based. Developed in Python and C. Version 0.93 released at Blackhat Europe

25 sapyto Available Plugins in sapyto v0.93 Audit: RFC Ping. Registration of External Servers. Detection of RFCEXEC. Detection of SAPXPG. Get system information. Get server documentation. Attack: RFC_START_PROGRAM Dir Traversal. Run commands through RFCEXEC. Run commands through SAPXPG. StickShell. Evil Twin Attack. Get remote RFCShell. Tools: RFC Password Obfuscator / De-obfuscator. 25

26 sapyto Hot News! sapyto v0.98 Core and architecture fully re-built. Based on connectors. The SAPRFC* connectors and the RFCSDK. Plugins are now categorized in Discovery, Audit and Exploit. Discovery plugins find new targets. Audit plugins carry out the vulnerability assessments. Exploit plugins are used as proof of concepts for discovered vulns. sapytoagents deployment. New plugins for auditing SAProuters, find clients, bruteforcing, 26

27 Discovery Phase Finding SAP targets 27

28 Discovery Phase Discovering SAP Systems and Applications (Targets) Available Options: Traffic sniffing. SAP portscanning. Checking SAPGUI configurations. SAP Systems use a fixed range of ports. Most ports follows the PREFIX + SYS. NUMBER format. Common ports: 32XX, 33XX, 36XX, 39XX, 3299, 81XX, Nmap: Watch Timings (-T3) and don t use version detection. New sapyto will provide automatic discovery of SAP systems and configuration of targets/connectors for auditing! 28

29 Exploration Phase Getting as much information as possible 29

30 Exploration Phase Getting Information from SAP Application Servers The RFC_SYSTEM_INFO function module returns information about remote SAP Application Servers (implemented in sapyto s sapinfo plugin) Can be called remotely (and anonymously) by default. [5] sapinfo(target#0) { Remote System Information: RFC Log Version: 011 Release Status of SAP System: 700 Kernel Release: 700 Operating System: Linux Database Host: sapl01 Central Database System: ORACLE Integer Format: Little Endian Dayligth Saving Time: Float Type Format: IEEE Hostame: sapl01 IP Address: System ID: TL1 RFC Destination: sapl01_tl1_00 Timezone: (diff from UTC in seconds) Character Set: 4103 Machine ID:

31 Exploration Phase Getting Information from SAP Application Servers The RFC_SYSTEM_INFO function module returns information about remote SAP Application Servers (implemented in sapyto s sapinfo plugin) Can be called remotely (and anonymously) by default. [5] sapinfo(target#0) { Remote System Information: Protection / RFC Countermeasure Log Version: 011 Release Status of SAP System: 700 Kernel Release: 700 Restrict connections Operating to the System: SAP Gateway Linux at the network level. For more information, Database refer Host: to SAP sapl01 Note Central Database System: ORACLE Integer Format: Little Endian Dayligth Saving Time: Float Type Format: IEEE Hostame: sapl01 IP Address: System ID: TL1 RFC Destination: sapl01_tl1_00 Timezone: (diff from UTC in seconds) Character Set: 4103 Machine ID:

32 Exploration Phase Finding Available Clients Users are client-dependent. Default clients: 000, 001, 066. getclients(target#0) { Client 000 is available. Client 001 is available. Client 066 is available. Client 101 is available. Client 200 is available. } res: Ok 32

33 Exploration Phase Analyzing Shared Resources The Common Transport Directory (CTD) is the directory where changes (transports) are exported to and imported from in an SAP landscape. This directory must be shared for all systems in the landscape. It is often the case, where the kernel files and profiles are shared to dialog instances. $ showmount e sapserver /export/usr/sap/trans (everyone) /export/sapmnt/np1 (everyone) /export/informix/np1 (everyone) /export/interfacesnp1 (everyone) /export/interfsrcnp1 (everyone) 33

34 Exploration Phase Analyzing Shared Resources The Common Transport Directory (CTD) is the directory where changes (transports) are exported to and imported from in an SAP landscape. This directory must be shared for all systems in the landscape. It is often the case, where the kernel files and profiles are shared to dialog instances. Protection / Countermeasure Shared resource access should be restricted to SAP $ showmount e sapserver related systems and users only. /export/usr/sap/trans (everyone) /export/sapmnt/np1 (everyone) /export/informix/np1 (everyone) /export/interfacesnp1 (everyone) /export/interfsrcnp1 (everyone) 34

35 Vulnerability Assesment Phase Analyzing the discovered components 35

36 Vulnerability Assessment Phase SAP Default Users There is public information regarding the existence of default SAP user accounts. Many of these accounts are configured with high privileged profiles. User ID Description Clients Password SAP* Super user 000,001, new clients PASS DDIC ABAP Dictionary super user 000, EARLYWATCH User for the EarlyWatch Service 066 SUPPORT SAPCPIC Communication User 000, 001 ADMIN 36

37 Vulnerability Assessment Phase SAP Default Users There is public information regarding the existence of default SAP user accounts. Many of these accounts are configured with high privileged profiles. User ID SAP* DDIC Description Protection / Countermeasure Super user Default users must be secured. ABAP Dictionary super user SAP* should be deactivated. Clients Password 000,001, new clients PASS 000, Use report RSUSR003 to check the status of default users. EARLYWATCH User for the EarlyWatch Service 066 SUPPORT SAPCPIC Communication User 000, 001 ADMIN 37

38 Vulnerability Assessment Phase SAP User Account Bruteforcing Usernames are up to 12 characters long. As part of the PenTest, you can try guessing/cracking user credentials. Max. Length Case Old Passwords ( 6.40) 8 Insensitive New Passwords (> 6.40) 40 Sensitive WARNING! User locking is implemented! (usually, between 3-12 tries) Ops! In versions 6.20, lock counter is not incremented through RFC. sapyto s brutelogin plugin can work in different modes: Try default users only and SAP*:PASS in detected clients. Specific credentials wordlist. Username and Password wordlists. 38

39 Vulnerability Assessment Phase Getting Credentials from the Wire RFC Sniffing RFC (Remote Function Call) is the most widely used interface in the SAP world. In order for a system to connect through RFC, it must provide login information for the remote system. RFC is clear-text, but you won t be able to see the password in the wire Password is obfuscated! -> Use sapyto s getpassword plugin... 01a f 22 ea 45 5e..._".E^ 01b0 22 c5 10 e c0 a8 02 8b " c0 0a f rfc_server d b 81 bb 89.BCUSER... 01e0 62 fc b5 3e e b..?w.oy f E b b e 5a f d 4f 4e...ZCUST_GETMON f 22 ea 45 5e 22 c5 10 EY..._".E^" e c0 a8 02 8b c...CL e 54 5f IENT_ID...CUS ff ff ff ff T c e 80...>. for CHAR in CLEAR_TEXT_PASS: OBFUSCATED_PASS[i] = CHAR XOR KEY[i] 39

40 Vulnerability Assessment Phase Getting Credentials from the Wire RFC Sniffing RFC (Remote Function Call) is the most widely used interface in the SAP world. In order for a system to connect through RFC, it must provide login information for the remote system. RFC is clear-text, but you won t be able to see the password in the wire Password is obfuscated! -> Use sapyto s getpassword plugin... Protection / Countermeasure Enable SNC, protecting the confidentiality and integrity of the traffic. 01a f 22 ea 45 5e..._".E^ 01b0 22 c5 10 e c0 a8 02 8b " c0 0a f rfc_server d b 81 bb 89.BCUSER... 01e0 62 fc b5 3e e b..?w.oy f E b b e 5a f d 4f 4e...ZCUST_GETMON f 22 ea 45 5e 22 c5 10 EY..._".E^" e c0 a8 02 8b c...CL e 54 5f IENT_ID...CUS ff ff ff ff T c e 80...>. for CHAR in CLEAR_TEXT_PASS: OBFUSCATED_PASS[i] = CHAR XOR KEY[i] 40

41 Vulnerability Assessment Phase Analysis of the RFC Interface RFC Communication is done through the Gateway Service. The GW can connect with external RFC servers: Registered Servers: The external system registers to the GW under a Program ID. Started Servers: The GW connects to a remote system and starts a program (trust?) By exploiting Registered Servers caveats, it may be possible to obtain confidential information, DoS, perform RFC MITM and callback attacks. By exploiting Started Servers vulnerabilities, it may be possible to obtain remote code execution on misconfigured Application Servers. (check the Attacking the Giants: Exploiting SAP Internals white-paper) 41

42 Exploitation Phase Getting access and beyond 42

43 Exploitation Phase But why do we need Exploitation anyway? Vulnerability Assessments reports enumerate discovered vulnerabilities with the associated risk estimate. A security aware individual would easily see the problems. But, what about the people from the Financial areas? For them to get involved, they need to see the facts! You must show them how their information can be compromised -> screenshots, livedemos Vulnerability Assessments are 2D, Exploitation adds a new Dimension. 43

44 Exploitation Phase SAP Password Considerations & Cracking SAP has implemented different password hashing mechanisms. Passwords hashes are stored in table USR02 (BCODE, PASSCODE) and USH02. Code Vers. A B C D E F G Description Obsolete Based on MD5, 8 characters, Uppercase, ASCII Not implemented Based on MD5, 8 characters, Uppercase, UTF-8 Reserved Based on SHA1, 40 characters, Case Insensitive, UTF-8 Code Version F + Code Version B (2 hashes) On June , a patch for John The Ripper for CODVN B and F was published. 44

45 Exploitation Phase SAP Password Considerations & Cracking SAP has implemented different password hashing mechanisms. Passwords hashes are stored in table USR02 (BCODE, PASSCODE) and USH02. Code Vers. A Description Protection / Countermeasure Obsolete B Based on MD5, 8 characters, Uppercase, ASCII Access to tables USR02 and USH02 should be protected. C Not implemented Password security should be enforced through profile configuration D (login/* Based parameters). on MD5, 8 characters, Uppercase, UTF-8 Table E USR40 can Reserved be used to protect from trivial passwords. For F more information, Based on refer SHA1, to SAP 40 characters, Note Case Insensitive, UTF-8 G Code Version F + Code Version B (2 hashes) On June 26, a patch for John The Ripper for CODVN B and F was published. 45

46 Exploitation Phase Exploiting SAP/Oracle Authentication Mechanism Discovered by me in Discovered by Jochen Hein in 2003 (D oh!) Target: Default SAP/Oracle installations. The SAP+Oracle Authentication Mechanism SAP connects to the database as the OPS$<username> (eg: OPS$<SID>adm). Retrieves user and password from table SAPUSER. Re-connects to the database, using the retrieved credentials. 46

47 Exploitation Phase Exploiting SAP/Oracle Authentication Mechanism There is a special Oracle configuration parameter named REMOTE_OS_AUTHENT. If set to TRUE, Oracle trusts that the remote system has authenticated the user used for the SQL connection (!) The user is created as indentified externally in the Oracle database. Oracle recommendation: remote_os_authent = false SAP default and necessary configuration: remote_os_authent = true What do you need? Database host/port. SAP System ID. Oracle Instance ID ( = SAPSID?) 47

48 Exploitation Phase Exploiting SAP/Oracle Authentication Mechanism There is a special Oracle configuration parameter named REMOTE_OS_AUTHENT. If set to TRUE, Oracle trusts that the remote system has authenticated the user used for the SQL connection (!) The user is created as indentified externally in the Oracle database. Protection / Countermeasure Oracle recommendation: remote_os_authent = false SAP default and necessary configuration: remote_os_authent = true What do you need? Restrict who can connect to the Oracle listener: Database host/port. tcp.validnode_checking = yes tcp.invited_nodes = ( , ) SAP System ID. Oracle Instance ID ( = SAPSID?) 48

49 Exploitation Phase Exploiting Weak RFC Interface Security Possible in default configuration of SAP Systems. Allows for unauthenticated remote code execution. Starting EXPLOIT plugins weakrfc(target#1) { Creating new SHELL object... SHELL object created. ID: 536 } res: Ok sapyto> shells sapyto/shells> list Shell ID: 536 [RFCShell] Target information: Connector: SAPRFC_EXT SAP Gateway Host: sapprd01 SAP Gateway Service: sapyto/shells> start 536 Starting shell #536 RFCShell - Run commands through RFC. The remote target OS is: Win.NET. sapyto/shells/536> run whoami Call successfull. Command output: prdadm sapyto/shells/536> 49

50 Exploitation Phase Exploiting Weak RFC Interface Security Possible in default configuration of SAP Systems. Allows for unauthenticated remote code execution. Starting EXPLOIT plugins weakrfc(target#1) { Creating new SHELL object... SHELL object created. ID: 536 } res: Ok sapyto> shells sapyto/shells> list Shell ID: 536 [RFCShell] Target information: Connector: SAPRFC_EXT SAP Gateway Host: sapprd01 SAP Gateway Service: Protection / Countermeasure Starting of External RFC Servers is controlled through the file specified by the gw/sec_info profile parameter. This file should exist and restrict access to allowed systems to start specific programs in the Application Servers. The gw/reg_info file protects Registered Servers and should be configured as well. For more information, refer to SAP Note sapyto/shells> start 536 Starting shell #536 RFCShell - Run commands through RFC. The remote target OS is: Win.NET. sapyto/shells/536> run whoami Call successfull. Command output: prdadm sapyto/shells/536> 50

51 Case Study: SAProuter Security Assessment 51

52 Case Study: SAProuter Security Assessment SAProuter Introduction SAProuter is an SAP program working as a proxy, which analyzes connections between SAP systems and between SAP systems and external networks. Typical SAProuter Architecture Internal Network External User Other Internal Systems Internet DEV QAS PRD IntraWeb SSH Server Border FW SAProuter Internal Users Mainframe 52

53 Case Study: SAProuter Security Assessment SAProuter Introduction If SAProuter is in place, clients have to specify a route string to connect. /H/saprouter/S/3299/H/sapprd1/S/3200 Access in controlled through an ACL file called Route Permission Table. Entry format: P/S/D src_host dst_host dst_port pwd First-match criteria. In no match, deny connection. 53

54 Case Study: SAProuter Security Assessment The Route Permission Table Route Permission Table Example: D host1 host2 servicex P * host2 * pass123 S 10.1.*.* * * D * * * * Route Permission Table in the real life: D host1 host2 servicex P * host2 * pass123 S 10.1.*.* * * P * * * * 54

55 Case Study: SAProuter Security Assessment SAProuter Security Assessment with sapyto The saprouterspy plugin Performs Internal Network port-scan. Discovers new targets through SAProuter and configure them for auditing by other plugins. 55

56 Case Study: SAProuter Security Assessment SAProuter Security Assessment: sapytoagents Native Routing SAPRouter also supports the routing of native protocols. Useful for remote administration of Operating Systems, DB, etc. Certain limitations apply. saprouteragent plugin deploys a sapytoagent, which can be used to proxy native connections (HTTP, SSH, Telnet, etc) to internal systems. 56

57 Case Study: SAProuter Security Assessment SAProuter Introduction SAProuter is an SAP program working as a proxy, which analyzes connections between SAP systems and between SAP systems and external networks. Protection / Countermeasure Internet Typical SAProuter Architecture SAProuter should be implemented in a separate DMZ. Use VPNs and/or restrict connections at the border Firewall. DEV Internal Network The Route External Permission User Table should restrict access only to allowed parties, to specific targets and ports. SNC should be required. QAS PRD Other Internal Systems Entries containing wildcards (*) are discouraged and should be carefully analyzed. IntraWeb SSH Server Border FW SAProuter Internal Users Mainframe 57

58 Conclusions Wrapping up 58

59 Conclusions Conclusions It s impossible to cover all the activities of an SAP Pentest in a one hour talk! SAP systems deal with sensitive business information and processes. The integrity, confidentiality and availability of this information is critical. SAP systems security is often overlooked during the implementation phase, in order to avoid business delays. SAP security is much more than User Roles/Profiles and Authorizations! By default, some configurations would expose the systems to high risk threats. SAP provides many ways to secure systems and communications. Administrators should enable security settings as soon as possible. Pentesting your SAP systems will let you know the current security level of your implementation (and show your managers why you need resources to secure it :P ) CYBSEC s sapyto supports activities of all phases of the project. SAP Penetration Tests should be carried out in controlled environments, performed by qualified experts in the subject. 59

60 References References Attacking the Giants: Exploiting SAP Internals White-paper John The Ripper Patch for SAP hashes sapyto CYBSEC s SAP Security Services SAP Note Security Note: Authority Check for Function Group SRFC. SAP Note Security-related enhancement of RFCEXEC program. SAP Note ABAP systems: Protection against password hash attacks 60

61 Questions? 61

62 Thank you! 62

SAP. Penetration Testing. with Onapsis Bizploit. Mariano Nuñez. Di Croce. HITB Security Conference, Dubai. April 22, 2010. mnunez@onapsis.

SAP. Penetration Testing. with Onapsis Bizploit. Mariano Nuñez. Di Croce. HITB Security Conference, Dubai. April 22, 2010. mnunez@onapsis. SAP Penetration Testing with Onapsis Bizploit Mariano Nuñez Di Croce [email protected] April 22, 2010 HITB Security Conference, Dubai Disclaimer This publication is copyright Onapsis SRL 2010 All rights

More information

SAP PENETRATION TESTING

SAP PENETRATION TESTING A CYBSEC-Labs Publication by Mariano Nuñez Di Croce April 16, 2009 Abstract Penetration Testing has become an industry-proven effective methodology to analyze the security level of information systems

More information

The SAProuter An Internet Window to your SAP Platform (and beyond)

The SAProuter An Internet Window to your SAP Platform (and beyond) The SAProuter An Internet Window to your SAP Platform (and beyond) July 2, 2010 HITBSecConf, Amsterdam Disclaimer This publication is copyright 2010 Onapsis SRL All rights reserved. No portion of this

More information

ATTACKS TO SAP WEB APPLICATIONS

ATTACKS TO SAP WEB APPLICATIONS ATTACKS TO SAP WEB APPLICATIONS by Mariano Nuñez Di Croce [email protected] BlackHat DC 2011 Briefings Abstract "SAP platforms are only accessible internally". While that was true in many organizations

More information

Inception of the SAP Platform's Brain Attacks on SAP Solution Manager

Inception of the SAP Platform's Brain Attacks on SAP Solution Manager Inception of the SAP Platform's Brain Attacks on SAP Solution Manager Juan Perez-Etchegoyen [email protected] May 23 rd, 2012 HITB Conference, Amsterdam Disclaimer This publication is copyright 2012

More information

SAP R/3 Security Assessment Framework

SAP R/3 Security Assessment Framework NII CONSULTING SAP R/3 Security Assessment Framework Version 1.0 N E T W O R K I N T E L L I G E N C E (IN D I A ) P VT. L TD. Contents Objective... 3 Methodology... 4 Phase 1: User Authentication... 4

More information

EAS-SEC Project: Securing Enterprise Business Applications

EAS-SEC Project: Securing Enterprise Business Applications EAS-SEC Project: Securing Enterprise Business Applications SESSION ID: SEC-W06 Alexander Polyakov CTO ERPScan @Twitter sh2kerr Alexander Polyakov CTO of the ERPScan inc EAS-SEC.org President Business application

More information

SAP SECURITY OPTIMIZATION

SAP SECURITY OPTIMIZATION SAP SECURITY OPTIMIZATION ABAP Checks This documents shows the description of all checks which are executed by the SAP Security Optimization Service for an ABAP system (Version from May 2014). Author:

More information

Attacking the Giants: Exploiting SAP Internals

Attacking the Giants: Exploiting SAP Internals Attacking the Giants: Exploiting SAP Internals Mariano Nuñez Di Croce mnunez [at] cybsec [dot] com March 30, 2007 Blackhat Europe 07 Agenda SAP Connectivity SAP RFC Interface The RFC Library Security Review

More information

Server Security. Contents. Is Rumpus Secure? 2. Use Care When Creating User Accounts 2. Managing Passwords 3. Watch Out For Aliases 4

Server Security. Contents. Is Rumpus Secure? 2. Use Care When Creating User Accounts 2. Managing Passwords 3. Watch Out For Aliases 4 Contents Is Rumpus Secure? 2 Use Care When Creating User Accounts 2 Managing Passwords 3 Watch Out For Aliases 4 Deploy A Firewall 5 Minimize Running Applications And Processes 5 Manage Physical Access

More information

Attacks to SAP. Web Applications Your crown jewels online. Mariano Nuñez Di Croce. Troopers, Germany. March 30th, 2011. mnunez@onapsis.

Attacks to SAP. Web Applications Your crown jewels online. Mariano Nuñez Di Croce. Troopers, Germany. March 30th, 2011. mnunez@onapsis. Attacks to SAP Web Applications Your crown jewels online Mariano Nuñez Di Croce [email protected] March 30th, 2011 Troopers, Germany Disclaimer This publication is copyright 2011 Onapsis SRL All rights

More information

SAP SECURITY CLEARING THE CONFUSION AND TAKING A HOLISTIC APPROACH

SAP SECURITY CLEARING THE CONFUSION AND TAKING A HOLISTIC APPROACH SAP SECURITY CLEARING THE CONFUSION AND TAKING A HOLISTIC APPROACH WWW.MANTRANCONSULTING.COM 25 Mar 2011, ISACA Singapore SOD SAS70 Project Controls Infrastructure security Configurable controls Change

More information

Penetration Testing Report Client: Business Solutions June 15 th 2015

Penetration Testing Report Client: Business Solutions June 15 th 2015 Penetration Testing Report Client: Business Solutions June 15 th 2015 Acumen Innovations 80 S.W 8 th St Suite 2000 Miami, FL 33130 United States of America Tel: 1-888-995-7803 Email: [email protected]

More information

CYBER-ATTACKS & SAP SYSTEMS Is our business-critical infrastructure exposed?

CYBER-ATTACKS & SAP SYSTEMS Is our business-critical infrastructure exposed? CYBER-ATTACKS & SAP SYSTEMS Is our business-critical infrastructure exposed? by Mariano Nunez [email protected] Abstract Global Fortune 1000 companies, large governmental organizations and defense entities

More information

Processed on SAP Solution Manager Service Center Release EHP 1 for Solution Manager 7.0 Telephone Service Tool 701_2011_1 SP0 Fax

Processed on SAP Solution Manager Service Center Release EHP 1 for Solution Manager 7.0 Telephone Service Tool 701_2011_1 SP0 Fax SERVICE REPORT SAP Security Optimization Self-Service SAP System ID SAP Product Release DB System Customer Processed on SAP Solution Manager Service Center Release EHP 1 for Solution Manager 7.0 Telephone

More information

SAP Netweaver Application Server and Netweaver Portal Security

SAP Netweaver Application Server and Netweaver Portal Security VU University Amsterdam SAP Netweaver Application Server and Netweaver Portal Security Author: Nick Kirtley Supervisors: Abbas Shahim, Frank Hakkennes Date: 28-09-2012 Organization: VU University Amsterdam,

More information

Security Considerations White Paper for Cisco Smart Storage 1

Security Considerations White Paper for Cisco Smart Storage 1 Security Considerations White Paper for Cisco Smart Storage An open network is like a bank s vault with windows Bill Thomson Network-Attached Storage (NAS) is a relatively simple and inexpensive way to

More information

Thick Client Application Security

Thick Client Application Security Thick Client Application Security Arindam Mandal ([email protected]) (http://www.paladion.net) January 2005 This paper discusses the critical vulnerabilities and corresponding risks in a two

More information

So far in the first three chapters of this book we have studied an overview of SAP

So far in the first three chapters of this book we have studied an overview of SAP 4 CHAPTER SAP ERP Integration Overview with Other Systems So far in the first three chapters of this book we have studied an overview of SAP business suite applications and the NetWeaver Application Server

More information

ITEC441- IS Security. Chapter 15 Performing a Penetration Test

ITEC441- IS Security. Chapter 15 Performing a Penetration Test 1 ITEC441- IS Security Chapter 15 Performing a Penetration Test The PenTest A penetration test (pentest) simulates methods that intruders use to gain unauthorized access to an organization s network and

More information

Auditing the Security of an SAP HANA Implementation

Auditing the Security of an SAP HANA Implementation Produced by Wellesley Information Services, LLC, publisher of SAPinsider. 2015 Wellesley Information Services. All rights reserved. Auditing the Security of an SAP HANA Implementation Juan Perez-Etchegoyen

More information

SAP Secure Operations Map. SAP Active Global Support Security Services May 2015

SAP Secure Operations Map. SAP Active Global Support Security Services May 2015 SAP Secure Operations Map SAP Active Global Support Security Services May 2015 SAP Secure Operations Map Security Compliance Security Governance Audit Cloud Security Emergency Concept Secure Operation

More information

Different ways to guess Oracle database SID

Different ways to guess Oracle database SID 30 October 2008 Different ways to guess Oracle database SID Digitаl Security Research Group (DSecRG) Alexander Polyakov [email protected] http://dsecrg.ru Content Introduction...3 A brief info about SID

More information

Oracle Database Security Myths

Oracle Database Security Myths Oracle Database Security Myths December 13, 2012 Stephen Kost Chief Technology Officer Integrigy Corporation Phil Reimann Director of Business Development Integrigy Corporation About Integrigy ERP Applications

More information

Andreas Mertz (Founder/Man. Dir. it-cube SYSTEMS, CISSP) 360 SAP Security

Andreas Mertz (Founder/Man. Dir. it-cube SYSTEMS, CISSP) 360 SAP Security Andreas Mertz (Founder/Man. Dir. it-cube SYSTEMS, CISSP) 360 SAP Security Agenda Motivation SAP Threat Vectors / SAP Hack Solution Approach the 360 of agilesi Threat Detection Secenarios / SIEM use cases

More information

R/3 Security Guide : VOLUME II

R/3 Security Guide : VOLUME II SAP AG Neurottstr. 16 D-69190 Walldorf R/3 Security R/3 Security Guide : VOLUME II R/3 Security Services in Detail Version 2.0a : English July 31, 1998 R/3 Security Services in Detail Copyright Copyright

More information

Insecure IP Storage Networks. Presenter: Himanshu Dwivedi Regional Technical Director @stake, Inc.

Insecure IP Storage Networks. Presenter: Himanshu Dwivedi Regional Technical Director @stake, Inc. Insecure IP Storage Networks Presenter: Himanshu Dwivedi Regional Technical Director @stake, Inc. BlackHat 2004 Agenda Insecure Network Attached Storage (NAS) Introduction NAS Protocols NAS Attacks Conclusion

More information

Five Steps to Improve Internal Network Security. Chattanooga ISSA

Five Steps to Improve Internal Network Security. Chattanooga ISSA Five Steps to Improve Internal Network Security Chattanooga ISSA 1 Find Me AverageSecurityGuy.info @averagesecguy [email protected] github.com/averagesecurityguy ChattSec.org 2 Why? The methodical

More information

Five Steps to Improve Internal Network Security. Chattanooga Information security Professionals

Five Steps to Improve Internal Network Security. Chattanooga Information security Professionals Five Steps to Improve Internal Network Security Chattanooga Information security Professionals Who Am I? Security Analyst: Sword & Shield Blogger: averagesecurityguy.info Developer: github.com/averagesecurityguy

More information

iscsi Security (Insecure SCSI) Presenter: Himanshu Dwivedi

iscsi Security (Insecure SCSI) Presenter: Himanshu Dwivedi iscsi Security (Insecure SCSI) Presenter: Himanshu Dwivedi Agenda Introduction iscsi Attacks Enumeration Authorization Authentication iscsi Defenses Information Security Partners (isec) isec Partners Independent

More information

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs Why Network Security? Keep the bad guys out. (1) Closed networks

More information

Topics in Network Security

Topics in Network Security Topics in Network Security Jem Berkes MASc. ECE, University of Waterloo B.Sc. ECE, University of Manitoba www.berkes.ca February, 2009 Ver. 2 In this presentation Wi-Fi security (802.11) Protecting insecure

More information

Vulnerability Assessment and Penetration Testing

Vulnerability Assessment and Penetration Testing Vulnerability Assessment and Penetration Testing Module 1: Vulnerability Assessment & Penetration Testing: Introduction 1.1 Brief Introduction of Linux 1.2 About Vulnerability Assessment and Penetration

More information

Penetration: from Application down to OS

Penetration: from Application down to OS April 13, 2010 Penetration: from Application down to OS Getting OS Access Using Lotus Domino Application Server Vulnerabilities Digitаl Security Research Group (DSecRG) www.dsecrg.com Alexandr Polyakov.

More information

What is Web Security? Motivation

What is Web Security? Motivation [email protected] http://www.brucker.ch/ Information Security ETH Zürich Zürich, Switzerland Information Security Fundamentals March 23, 2004 The End Users View The Server Providers View What is Web

More information

4. Getting started: Performing an audit

4. Getting started: Performing an audit 4. Getting started: Performing an audit Introduction Security scans enable systems administrators to identify and assess possible risks within a network. Through GFI LANguard N.S.S. this is performed automatically,

More information

Directory and File Transfer Services. Chapter 7

Directory and File Transfer Services. Chapter 7 Directory and File Transfer Services Chapter 7 Learning Objectives Explain benefits offered by centralized enterprise directory services such as LDAP over traditional authentication systems Identify major

More information

REPORT ON AUDIT OF LOCAL AREA NETWORK OF C-STAR LAB

REPORT ON AUDIT OF LOCAL AREA NETWORK OF C-STAR LAB REPORT ON AUDIT OF LOCAL AREA NETWORK OF C-STAR LAB Conducted: 29 th March 5 th April 2007 Prepared By: Pankaj Kohli (200607011) Chandan Kumar (200607003) Aamil Farooq (200505001) Network Audit Table of

More information

Top 10 most interesting SAP vulnerabilities and attacks Alexander Polyakov

Top 10 most interesting SAP vulnerabilities and attacks Alexander Polyakov Invest in security to secure investments Top 10 most interesting SAP vulnerabilities and attacks Alexander Polyakov CTO at ERPScan May 9, 2012 Me Business application security expert What is SAP? Shut

More information

Hack Your SQL Server Database Before the Hackers Do

Hack Your SQL Server Database Before the Hackers Do Note: This article was edited in Oct. 2013, from numerous Web Sources. TJS At the Install: The default install for SQL server makes it is as secure as it will ever be. DBAs and developers will eventually

More information

Locking down a Hitachi ID Suite server

Locking down a Hitachi ID Suite server Locking down a Hitachi ID Suite server 2016 Hitachi ID Systems, Inc. All rights reserved. Organizations deploying Hitachi ID Identity and Access Management Suite need to understand how to secure its runtime

More information

How to break in. Tecniche avanzate di pen testing in ambito Web Application, Internal Network and Social Engineering

How to break in. Tecniche avanzate di pen testing in ambito Web Application, Internal Network and Social Engineering How to break in Tecniche avanzate di pen testing in ambito Web Application, Internal Network and Social Engineering Time Agenda Agenda Item 9:30 10:00 Introduction 10:00 10:45 Web Application Penetration

More information

Penetration Testing - a way for improving our cyber security

Penetration Testing - a way for improving our cyber security OWASP EU Tour Bucharest 2013 The OWASP Foundation http://www.owasp.org Penetration Testing - a way for improving our cyber security Adrian Furtunǎ, PhD, OSCP, CEH [email protected] Copyright The OWASP

More information

The purpose of this report is to educate our prospective clients about capabilities of Hackers Locked.

The purpose of this report is to educate our prospective clients about capabilities of Hackers Locked. This sample report is published with prior consent of our client in view of the fact that the current release of this web application is three major releases ahead in its life cycle. Issues pointed out

More information

Members of the UK cyber security forum. Soteria Health Check. A Cyber Security Health Check for SAP systems

Members of the UK cyber security forum. Soteria Health Check. A Cyber Security Health Check for SAP systems Soteria Health Check A Cyber Security Health Check for SAP systems Soteria Cyber Security are staffed by SAP certified consultants. We are CISSP qualified, and members of the UK Cyber Security Forum. Security

More information

SoftNAS Application Guide: In-Flight Encryption 12/7/2015 SOFTNAS LLC

SoftNAS Application Guide: In-Flight Encryption 12/7/2015 SOFTNAS LLC SoftNAS Application Guide: In-Flight Encryption 12/7/2015 SOFTNAS LLC SoftNAS Application Guide: In-Flight Encryption Contents Introduction to In-Flight Data Encryption... 2 CIFS Encryption In-Flight...

More information

https://elearn.zdresearch.com https://training.zdresearch.com/course/pentesting

https://elearn.zdresearch.com https://training.zdresearch.com/course/pentesting https://elearn.zdresearch.com https://training.zdresearch.com/course/pentesting Chapter 1 1. Introducing Penetration Testing 1.1 What is penetration testing 1.2 Different types of test 1.2.1 External Tests

More information

Oracle Data Integrator

Oracle Data Integrator Oracle Data Integrator Getting Started with SAP ABAP ERP Adapter 10g Release 3 (10.1.3) July 2011 Oracle Data Integrator: Getting Started with SAP ABAP ERP Adapter, 10g Release 3 (10.1.3) Copyright 2011,

More information

Author: Sumedt Jitpukdebodin. Organization: ACIS i-secure. Email ID: [email protected]. My Blog: http://r00tsec.blogspot.com

Author: Sumedt Jitpukdebodin. Organization: ACIS i-secure. Email ID: materaj@gmail.com. My Blog: http://r00tsec.blogspot.com Author: Sumedt Jitpukdebodin Organization: ACIS i-secure Email ID: [email protected] My Blog: http://r00tsec.blogspot.com Penetration Testing Linux with brute force Tool. Sometimes I have the job to penetration

More information

A Decision Maker s Guide to Securing an IT Infrastructure

A Decision Maker s Guide to Securing an IT Infrastructure A Decision Maker s Guide to Securing an IT Infrastructure A Rackspace White Paper Spring 2010 Summary With so many malicious attacks taking place now, securing an IT infrastructure is vital. The purpose

More information

SAP SECURITY OPTIMIZATION

SAP SECURITY OPTIMIZATION SAP SECURITY OPTIMIZATION ABAP Checks This document shows the description of all checks which are executed by the SAP Security Optimization Service for an ABAP system (Version from July 2011). Author:

More information

Firewalls and Software Updates

Firewalls and Software Updates Firewalls and Software Updates License This work by Z. Cliffe Schreuders at Leeds Metropolitan University is licensed under a Creative Commons Attribution-ShareAlike 3.0 Unported License. Contents General

More information

COMPREHENSIVE SECURITY AUDIT COMMERCIAL TAXES DEPARTMENT, KARNATAKA. Ashish Kirtikar

COMPREHENSIVE SECURITY AUDIT COMMERCIAL TAXES DEPARTMENT, KARNATAKA. Ashish Kirtikar COMPREHENSIVE SECURITY AUDIT COMMERCIAL TAXES DEPARTMENT, KARNATAKA Ashish Kirtikar Agenda Scope IS Audit High-level Strengths Weaknesses Recommendations. Network Architecture Review Weaknesses Recommendations.

More information

IT HEALTHCHECK TOP TIPS WHITEPAPER

IT HEALTHCHECK TOP TIPS WHITEPAPER WHITEPAPER PREPARED BY MTI TECHNOLOGY LTD w: mti.com t: 01483 520200 f: 01483 520222 MTI Technology have been specifying and conducting IT Healthcheck s across numerous sectors including commercial, public

More information

Out of the Fire - Adding Layers of Protection When Deploying Oracle EBS to the Internet

Out of the Fire - Adding Layers of Protection When Deploying Oracle EBS to the Internet Out of the Fire - Adding Layers of Protection When Deploying Oracle EBS to the Internet March 8, 2012 Stephen Kost Chief Technology Officer Integrigy Corporation Phil Reimann Director of Business Development

More information

SCP - Strategic Infrastructure Security

SCP - Strategic Infrastructure Security SCP - Strategic Infrastructure Security Lesson 1 - Cryptogaphy and Data Security Cryptogaphy and Data Security History of Cryptography The number lock analogy Cryptography Terminology Caesar and Character

More information

Where every interaction matters.

Where every interaction matters. Where every interaction matters. Peer 1 Vigilant Web Application Firewall Powered by Alert Logic The Open Web Application Security Project (OWASP) Top Ten Web Security Risks and Countermeasures White Paper

More information

Database Security Guide

Database Security Guide Institutional and Sector Modernisation Facility ICT Standards Database Security Guide Document number: ISMF-ICT/3.03 - ICT Security/MISP/SD/DBSec Version: 1.10 Project Funded by the European Union 1 Document

More information

Data Collection and Analysis: Get End-to-End Security with Cisco Connected Analytics for Network Deployment

Data Collection and Analysis: Get End-to-End Security with Cisco Connected Analytics for Network Deployment White Paper Data Collection and Analysis: Get End-to-End Security with Cisco Connected Analytics for Network Deployment Cisco Connected Analytics for Network Deployment (CAND) is Cisco hosted, subscription-based

More information

Cyber Essentials. Test Specification

Cyber Essentials. Test Specification Cyber Essentials Test Specification Contents Scope of the Audit...2 Assumptions...3 Success Criteria...3 External systems...4 Required tests...4 Test Details...4 Internal systems...7 Tester pre-requisites...8

More information

SAST, DAST and Vulnerability Assessments, 1+1+1 = 4

SAST, DAST and Vulnerability Assessments, 1+1+1 = 4 SAST, DAST and Vulnerability Assessments, 1+1+1 = 4 Gordon MacKay Digital Defense, Inc. Chris Wysopal Veracode Session ID: Session Classification: ASEC-W25 Intermediate AGENDA Risk Management Challenges

More information

FINAL DoIT 04.01.2013- v.8 APPLICATION SECURITY PROCEDURE

FINAL DoIT 04.01.2013- v.8 APPLICATION SECURITY PROCEDURE Purpose: This procedure identifies what is required to ensure the development of a secure application. Procedure: The five basic areas covered by this document include: Standards for Privacy and Security

More information

An Introduction to Network Vulnerability Testing

An Introduction to Network Vulnerability Testing CONTENTS Introduction 3 Penetration Testing Overview 4 Step 1: Defining the Scope 4 Step 2: Performing the Penetration Test 5 Step 3: Reporting and Delivering Results 6 VeriSign SecureTEST 7 Common Vulnerability

More information

Firewalls. Chapter 3

Firewalls. Chapter 3 Firewalls Chapter 3 1 Border Firewall Passed Packet (Ingress) Passed Packet (Egress) Attack Packet Hardened Client PC Internet (Not Trusted) Hardened Server Dropped Packet (Ingress) Log File Internet Border

More information

Exploiting Transparent User Identification Systems

Exploiting Transparent User Identification Systems Exploiting Transparent User Identification Systems Wayne Murphy Benjamin Burns Version 1.0a 1 CONTENTS 1.0 Introduction... 3 1.1 Project Objectives... 3 2.0 Brief Summary of Findings... 4 3.0 Background

More information

Demystifying Penetration Testing for the Enterprise. Presented by Pravesh Gaonjur

Demystifying Penetration Testing for the Enterprise. Presented by Pravesh Gaonjur Demystifying Penetration Testing for the Enterprise Presented by Pravesh Gaonjur Pravesh Gaonjur Founder and Executive Director of TYLERS Information Security Consultant Certified Ethical Hacker (CEHv8Beta)

More information

IBM. Vulnerability scanning and best practices

IBM. Vulnerability scanning and best practices IBM Vulnerability scanning and best practices ii Vulnerability scanning and best practices Contents Vulnerability scanning strategy and best practices.............. 1 Scan types............... 2 Scan duration

More information

EC-Council Certified Security Analyst / License Penetration Tester (ECSA/LPT) v4.0 Bootcamp

EC-Council Certified Security Analyst / License Penetration Tester (ECSA/LPT) v4.0 Bootcamp EC-Council Certified Security Analyst / License Penetration Tester (ECSA/LPT) v4.0 Bootcamp ECSA/LPT is a security class like no other! Providing real world hands on experience, it is the only in-depth

More information

Catapult PCI Compliance

Catapult PCI Compliance Catapult PCI Compliance Table of Contents Catapult PCI Compliance...1 Table of Contents...1 Overview Catapult (PCI)...2 Support and Contact Information...2 Dealer Support...2 End User Support...2 Catapult

More information

Black Box Penetration Testing For GPEN.KM V1.0 Month dd "#$!%&'(#)*)&'+!,!-./0!.-12!1.03!0045!.567!5895!.467!:;83!-/;0!383;!

Black Box Penetration Testing For GPEN.KM V1.0 Month dd #$!%&'(#)*)&'+!,!-./0!.-12!1.03!0045!.567!5895!.467!:;83!-/;0!383;! Sample Penetration Testing Report Black Box Penetration Testing For GPEN.KM V1.0 Month dd "#$%&'#)*)&'+,-./0.-121.030045.5675895.467:;83-/;0383; th, yyyy A&0#0+4*M:+:#&*#0%+C:,#0+4N:

More information

Host Hardening. Presented by. Douglas Couch & Nathan Heck Security Analysts for ITaP 1

Host Hardening. Presented by. Douglas Couch & Nathan Heck Security Analysts for ITaP 1 Host Hardening Presented by Douglas Couch & Nathan Heck Security Analysts for ITaP 1 Background National Institute of Standards and Technology Draft Guide to General Server Security SP800-123 Server A

More information

FREQUENTLY ASKED QUESTIONS

FREQUENTLY ASKED QUESTIONS FREQUENTLY ASKED QUESTIONS Secure Bytes, October 2011 This document is confidential and for the use of a Secure Bytes client only. The information contained herein is the property of Secure Bytes and may

More information

April 11, 2011. (Revision 2)

April 11, 2011. (Revision 2) Passive Vulnerability Scanning Overview April 11, 2011 (Revision 2) Copyright 2011. Tenable Network Security, Inc. All rights reserved. Tenable Network Security and Nessus are registered trademarks of

More information

Security Awareness For Server Administrators. State of Illinois Central Management Services Security and Compliance Solutions

Security Awareness For Server Administrators. State of Illinois Central Management Services Security and Compliance Solutions Security Awareness For Server Administrators State of Illinois Central Management Services Security and Compliance Solutions Purpose and Scope To present a best practice approach to securing your servers

More information

1. LAB SNIFFING LAB ID: 10

1. LAB SNIFFING LAB ID: 10 H E R A LAB ID: 10 SNIFFING Sniffing in a switched network ARP Poisoning Analyzing a network traffic Extracting files from a network trace Stealing credentials Mapping/exploring network resources 1. LAB

More information

WHITE PAPER. FortiWeb and the OWASP Top 10 Mitigating the most dangerous application security threats

WHITE PAPER. FortiWeb and the OWASP Top 10 Mitigating the most dangerous application security threats WHITE PAPER FortiWeb and the OWASP Top 10 PAGE 2 Introduction The Open Web Application Security project (OWASP) Top Ten provides a powerful awareness document for web application security. The OWASP Top

More information

ERP Security. Myths, Problems, Solutions

ERP Security. Myths, Problems, Solutions ERP Security. Myths, Problems, Solutions Digital Security Ilya Medvedovskiy CEO of the Digital Security company Network security research since 1994 (NoVell networks) Book bestseller Attack through the

More information

Research Paper SAP Penetration Testing Using Metasploit

Research Paper SAP Penetration Testing Using Metasploit Research Paper SAP Penetration Testing Using Metasploit How to Protect Sensitive ERP Data October 2013 Table of Contents Executive Summary 3 Introduction to Penetration Tests of SAP Systems 4 Understanding

More information

Using RADIUS Agent for Transparent User Identification

Using RADIUS Agent for Transparent User Identification Using RADIUS Agent for Transparent User Identification Using RADIUS Agent Web Security Solutions Version 7.7, 7.8 Websense RADIUS Agent works together with the RADIUS server and RADIUS clients in your

More information

Lab Objectives & Turn In

Lab Objectives & Turn In Firewall Lab This lab will apply several theories discussed throughout the networking series. The routing, installing/configuring DHCP, and setting up the services is already done. All that is left for

More information

Secret Server Qualys Integration Guide

Secret Server Qualys Integration Guide Secret Server Qualys Integration Guide Table of Contents Secret Server and Qualys Cloud Platform... 2 Authenticated vs. Unauthenticated Scanning... 2 What are the Advantages?... 2 Integrating Secret Server

More information

Too Critical To Fail Cyber-Attacks on ERP, CRM, SCM and HR Systems

Too Critical To Fail Cyber-Attacks on ERP, CRM, SCM and HR Systems Too Critical To Fail Cyber-Attacks on ERP, CRM, SCM and HR Systems SESSION ID: HTA-R01 Mariano Nunez CEO Onapsis Inc. @marianonunezdc Why Should We Care? Over 95% of the ERP systems analyzed were exposed

More information

If I want a perfect cyberweapon, I'll target ERP

If I want a perfect cyberweapon, I'll target ERP If I want a perfect cyberweapon, I'll target ERP Alexander Polyakov / ERPScan Session ID: ADS-R07 Session Classification: Advanced Intro I hate CYBER talks and all that buzz I usually do more technical

More information

The Trivial Cisco IP Phones Compromise

The Trivial Cisco IP Phones Compromise Security analysis of the implications of deploying Cisco Systems SIP-based IP Phones model 7960 Ofir Arkin Founder The Sys-Security Group [email protected] http://www.sys-security.com September 2002

More information

Guidance Regarding Skype and Other P2P VoIP Solutions

Guidance Regarding Skype and Other P2P VoIP Solutions Guidance Regarding Skype and Other P2P VoIP Solutions Ver. 1.1 June 2012 Guidance Regarding Skype and Other P2P VoIP Solutions Scope This paper relates to the use of peer-to-peer (P2P) VoIP protocols,

More information

Detecting and Stopping Cyber Attacks Against Oracle Databases June 25, 2015

Detecting and Stopping Cyber Attacks Against Oracle Databases June 25, 2015 Detecting and Stopping Cyber Attacks Against Oracle Databases June 25, 2015 Stephen Kost Chief Technology Officer Integrigy Corporation Agenda How and Why Prevention Q&A 1 2 3 4 5 Targeted Attack Detection

More information

A REVIEW OF METHODS FOR SECURING LINUX OPERATING SYSTEM

A REVIEW OF METHODS FOR SECURING LINUX OPERATING SYSTEM A REVIEW OF METHODS FOR SECURING LINUX OPERATING SYSTEM 1 V.A.Injamuri Govt. College of Engineering,Aurangabad, India 1 [email protected] Abstract This paper is focused on practical securing Linux

More information

SANS Top 20 Critical Controls for Effective Cyber Defense

SANS Top 20 Critical Controls for Effective Cyber Defense WHITEPAPER SANS Top 20 Critical Controls for Cyber Defense SANS Top 20 Critical Controls for Effective Cyber Defense JANUARY 2014 SANS Top 20 Critical Controls for Effective Cyber Defense Summary In a

More information

NETWORK AND CERTIFICATE SYSTEM SECURITY REQUIREMENTS

NETWORK AND CERTIFICATE SYSTEM SECURITY REQUIREMENTS NETWORK AND CERTIFICATE SYSTEM SECURITY REQUIREMENTS Scope and Applicability: These Network and Certificate System Security Requirements (Requirements) apply to all publicly trusted Certification Authorities

More information

!!!!!!!!!!!!!!!!!!!!!!

!!!!!!!!!!!!!!!!!!!!!! Infrastructure Security Assessment Methodology January 2014 RSPS01 Version 2.1 RandomStorm - Security Assessment Methodology - RSPS01 Version 2.1-2014 - Page 1 Document Details Any enquires relating to

More information

PTSv2 in pills: The Best First for Beginners who want to become Penetration Testers. Self-paced, online, flexible access

PTSv2 in pills: The Best First for Beginners who want to become Penetration Testers. Self-paced, online, flexible access The Best First for Beginners who want to become Penetration Testers PTSv2 in pills: Self-paced, online, flexible access 900+ interactive slides and 3 hours of video material Interactive and guided learning

More information

Firewalls & Intrusion Detection

Firewalls & Intrusion Detection Firewalls & Intrusion Detection CS 594 Special Topics/Kent Law School: Computer and Network Privacy and Security: Ethical, Legal, and Technical Consideration 2007, 2008 Robert H. Sloan Security Intrusion

More information

How To Set Up An Ip Firewall On Linux With Iptables (For Ubuntu) And Iptable (For Windows)

How To Set Up An Ip Firewall On Linux With Iptables (For Ubuntu) And Iptable (For Windows) Security principles Firewalls and NAT These materials are licensed under the Creative Commons Attribution-Noncommercial 3.0 Unported license (http://creativecommons.org/licenses/by-nc/3.0/) Host vs Network

More information

What IT Auditors Need to Know About Secure Shell. SSH Communications Security

What IT Auditors Need to Know About Secure Shell. SSH Communications Security What IT Auditors Need to Know About Secure Shell SSH Communications Security Agenda Secure Shell Basics Security Risks Compliance Requirements Methods, Tools, Resources What is Secure Shell? A cryptographic

More information

SECURITY TRENDS & VULNERABILITIES REVIEW 2015

SECURITY TRENDS & VULNERABILITIES REVIEW 2015 SECURITY TRENDS & VULNERABILITIES REVIEW 2015 Contents 1. Introduction...3 2. Executive summary...4 3. Inputs...6 4. Statistics as of 2014. Comparative study of results obtained in 2013...7 4.1. Overall

More information

ANNEXURE-1 TO THE TENDER ENQUIRY NO.: DPS/AMPU/MIC/1896. Network Security Software Nessus- Technical Details

ANNEXURE-1 TO THE TENDER ENQUIRY NO.: DPS/AMPU/MIC/1896. Network Security Software Nessus- Technical Details Sub: Supply, Installation, setup and testing of Tenable Network Security Nessus vulnerability scanner professional version 6 or latest for scanning the LAN, VLAN, VPN and IPs with 3 years License/Subscription

More information

Nixu SNS Security White Paper May 2007 Version 1.2

Nixu SNS Security White Paper May 2007 Version 1.2 1 Nixu SNS Security White Paper May 2007 Version 1.2 Nixu Software Limited Nixu Group 2 Contents 1 Security Design Principles... 3 1.1 Defense in Depth... 4 1.2 Principle of Least Privilege... 4 1.3 Principle

More information

Tenable for CyberArk

Tenable for CyberArk HOW-TO GUIDE Tenable for CyberArk Introduction This document describes how to deploy Tenable SecurityCenter and Nessus for integration with CyberArk Enterprise Password Vault. Please email any comments

More information

Project 2: Penetration Testing (Phase II)

Project 2: Penetration Testing (Phase II) Project 2: Penetration Testing (Phase II) CS 161 - Joseph/Tygar November 17, 2006 1 Edits If we need to make clarifications or corrections to this document after distributing it, we will post a new version

More information

SonicWALL PCI 1.1 Implementation Guide

SonicWALL PCI 1.1 Implementation Guide Compliance SonicWALL PCI 1.1 Implementation Guide A PCI Implementation Guide for SonicWALL SonicOS Standard In conjunction with ControlCase, LLC (PCI Council Approved Auditor) SonicWall SonicOS Standard

More information