Oracle PeopleSoft Applications are Under Attack
|
|
|
- Mervin Wilkins
- 10 years ago
- Views:
Transcription
1 Oracle PeopleSoft Applications are Under Attack Alexey Tyurin
2 Table of Contents Introduction... 3 About PeopleSoft applications... 3 Core technologies... 4 PeopleTools... 4 PeopleCode... 4 PIA... 4 Web server... 5 Application server... 5 Database server... 6 PeopleTools development environment... 6 PeopleSoft Portal... 6 Security... 7 Role model... 7 Attacks on back- end systems... 7 Attacks on front- end systems... 9 Attacks through WebLogic... 9 Attacks from PeopleSoft servlets Attack through PeopleSoft SSO Conclusion About the author About ERPScan About ERPScan Research Our contacts
3 Introduction Oracle PeopleSoft applications include different critical business systems like HRMS, FMS, SCM, CRM, etc. They are widespread in the world (about 50 % of Fortune 100). In addition, some of these systems (especially HRMS) are accessible from the Internet. Nevertheless, there is almost no research on the security of PeopleSoft applications. Oracle publishes basic information about vulnerabilities in the applications on a regular basis, but it s not enough for penetration testers. In addition, the uncommon internal architecture of PeopleSoft applications makes black- box testing much harder. On other hand, we see public news about successful attacks against PeopleSoft shows up from time to time. Let s start with some basic information about PeopleSoft and its architecture to be able to understand how specific attacks work. About PeopleSoft applications Oracle's PeopleSoft applications are designed to address the most complex business requirements. They provide comprehensive business and industry solutions, enabling organizations to increase productivity, accelerate business performance, and provide a lower cost of ownership. Oracle's PeopleSoft applications provided Human Resource Management Systems (HRMS), Financial Management Solutions (FMS), Supply Chain Management (SCM) and customer relationship management (CRM), Enterprise Performance Management software (EPM), as well as software solutions for manufacturing and student administration to large corporations, governments, and organizations. PeopleSoft's product suite was initially based on a client server approach with a dedicated client. With the release of version 8, the entire suite moved to a web- centric design called PeopleSoft Internet Architecture (PIA). The new format allowed all of a company's business functions to be accessed and run on a web browser. The application can function as an ERP, similar to SAP, but can also be used for single modules for example, HCM alone. In terms of penetration testing, it is not so important which modules comprise a particular system, but it is important to understand what PIA is. This understanding requires knowledge of some specific core technologies which PIA is based on. 3
4 Core technologies PeopleTools The architecture is built around PeopleSoft s proprietary PeopleTools technology. PeopleTools, an object- oriented development environment, allows for the rapid and efficient development of applications. The PeopleTools development and runtime environment includes the basic technology features on which PeopleSoft Enterprise Portal is built. PeopleTools includes many different components used to create web- based applications: a scripting language known as PeopleCode, design tools to define various types of metadata, standard security structure, batch processing tools, and the ability to interface with a SQL database. The metadata describes data for user interfaces, tables, messages, security, navigation, portals, etc. This set of tools allows the PeopleSoft suite to be platform independent. The PeopleTools consist of Application Designer, Application Engine, Data Mover, PeopleCode and various other developer tools. PeopleCode PeopleCode is an object- oriented proprietary (case- insensitive) language used to express business logic for PeopleSoft applications. In its fundamentals, PeopleCode syntax resembles other programming languages. Some aspects of the PeopleCode language, however, are specifically related to the PeopleTools environment. However, the fundamentals of objects and classes are the same as in Java language. PeopleCode supports data types and metastrings, Structured Query Language (SQL), calls of stored in external libraries and programs. PIA PeopleSoft Internet Architecture, introduced with PeopleTools 8, is completely focused on the internet to provide powerful new functionality for internet- based access and integration. PeopleSoft Internet Architecture is a server centric, component architecture that enables secure end user access to PeopleSoft applications. 4
5 Web server The web server receives application requests from the web environment (internet and intranet) and forwards the requests to the Oracle Jolt port on the application server. A collection of PeopleSoft servlets running on the web server handle incoming requests. Like the server processes on the application server, each PeopleSoft servlet is designed to perform unique functions. Application server The application server is the core of the PeopleSoft Internet Architecture; it runs the business logic and processes all application requests, it issues SQL to the database server. The application server consists of numerous PeopleSoft services and server processes that handle transaction requests. Unique server processes run on the application server, with each server process type designed to handle specific types of transactions. For example, some server processes are designed to handle browser requests, while others are designed to handle Integration Broker requests. 5
6 The application server is responsible for maintaining the SQL connection to the database for the browser requests and the Windows Development Environment. PeopleSoft uses TUXEDO to manage database transactions, and Jolt, TUXEDO's counterpart, to facilitate transaction requests issued from the Internet. Oracle Jolt provides the Java interface making Oracle Tuxedo available for web- based requests. The PeopleSoft servlets on the web server transmit requests and data through a connection to Jolt, which runs on the application server. Jolt extends Tuxedo's capabilities to the Internet; it is the communication layer between the web- based environment and the C++ environments. Database server The database server houses your database engine and your PeopleSoft database, which includes all of your object definitions, system tables, application tables, and data. After you install your database engine there are three distinct layers within the database that work in concert to store and manage data for your PeopleSoft system. The database system tables manage both the PeopleTools and PeopleSoft application database objects, while the PeopleSoft application tables reside within the infrastructure defined by the PeopleTools metadata. PeopleTools provides an abstraction layer, which insulates application developers from the intricacies of each of the specific database platforms. PeopleTools development environment While many development and administrative tools and interfaces are accessible by browser, some tools are only available from a Windows- based workstation. There are collection of Windows- based PeopleTools, which enables application developers, technical specialists, and system administrators to perform a variety of tasks. PeopleSoft Portal The Enterprise PeopleTools internet technology is a combination of the PeopleSoft Pure Internet Architecture and the PeopleTools portal technology, which is used for creating and managing portals. The PeopleTools portal technology is built on top of PeopleSoft Pure Internet Architecture and provides you with the ability to easily access and administer multiple content providers, such as PeopleSoft applications like CRM and HCM, as well as non- PeopleSoft content. It enables you to combine content from these multiple sources and deliver the result to end users in a unified, simple- to- use interface. 6
7 Security As we have contemplated, PeopleSoft applications are quite complex and multi- component. Naturally, their security is not a simple thing either. We will only research a few of its aspects in this whitepaper. Role model PeopleSoft applications are based on role model. It is essentially the classic approach which consists of three basic elements: permission lists, roles, users. It should be noted that this approach is highly flexible, but it has the usual SoD issues nonetheless. Attacks on back- end systems Now that we are acquainted with the architecture of PeopleSoft applications, we can move on to the relevant attacks. Let s start with attacks on back- end systems. It is implied that the attacker is located inside the internal corporate network. They are supposed to have network access to the database and the application server. I will not describe all possible attacks through the OS, network environment, or DBMS but will instead concentrate on PeopleSoft- specific attacks. To begin with, let s find out how the authentication of a PeopleSoft user into the application server works. Some essential terms: User ID a PeopleSoft user account Connect ID a special account with minimal DBMS privileges Access ID a special account with high DBMS privileges Authentication consists of the following steps: 1. User enters his/her user ID and password in the application server 2. Application server retrieves this data and connects to the database using Connect ID with the corresponding password. This DBMS account has limited access (can read the tables PSDBOWNER, PSSTATUS, PSOPRDEFN, PSACCESSPRFL). It requests the user ID and password and compares them with those which were entered. 3. If the comparison succeeds, the system retrieves Symbolic ID (associated with) User ID. Symbolic ID is just a link to a more important account: Access ID, which is used to simplify the system administration and increase the security. 7
8 4. The system uses the retrieved Symbolic ID to find the necessary account (Access ID + password) in PSACCESSPRFL. This is a privileged account which has more rights in PeopleSoft database than Connect ID. Access ID and the password are encrypted. 5. The system uses Access ID to reconnect to the database. So apparently the application server uses two user accounts to work with the DBMS. But some databases, like MS SQL, have only one user account by default. When PeopleSoft is installed, an additional account (in this case, Connect ID) is created automatically. As a result, sa usually serves as the Access ID for MS SQL and SYSADM is used for Oracle. The Connect ID is typically people and the password is peop1e. Also, some Internet manuals recommend disabling password policies for both accounts since the entire system will terminate if an account is blocked for any reason. All in all, we ve got some very convenient conditions for bruteforce attacks on DBMS. But let s look closer at the access available to Connect ID. It lets us read data from three tables. But only two of them have valuable information. The first table PSOPRDEFN contains PeopleSoft usernames and their passwords. But the passwords are hashed, and each password even gets its own random salt. They can be bruteforced too, of course, but the result depends on their complexity. The second table PSACCESSPRFL contains the encrypted Access ID and its password. Oracle documentation states that Access ID is encrypted and therefore secure. But is that true? A small research of ours has only revealed a XOR operation with a hardcoded key. What s more, the key is similar for all PeopleSoft applications. Thus, anyone can decrypt Access ID and its password. Another important consequence is the length restriction. An Access ID password cannot be longer than 10 symbols. This facilitates bruteforce attacks as well. To sum it up: is an attacker gets a Connect ID account and manages to connect to the DBMS, they will easily decrypt Access ID and have total control over PeopleSoft. How else can one acquire Connect ID? Let s not forget there are two types of PeopleSoft developers. Both use PeopleTools applications for Windows for development and administration purposes. 8
9 2 Tier Developers. They connect to the DBMS directly, which means they need a DBMS account. They typically log in under Access ID. But a DBMS account can be saved by the application, which means an attacker can steal it if they access the developer s PC. The account will be stored in the Windows registry. The password is encrypted, but it uses the same encryption (XOR) and the same key as the Access ID stored in the PSACCESSPRFL table. 3 Tier Developers. They use their PeopleSoft accounts to connect to the application server, which, in turn, connects them to the DBMS. A special protocol called Tuxedo is used. So what can we get here? First, this protocol is not encrypted by default, and the username and password are transmitted with every request, so we can get the User ID by an MitM attack. Second, what this protocol transmits is essentially SQL queries redirected by the application server from the developer to the DBMS. Whatever rights a developer has (they may be restricted), they can actually execute any DBMS queries under the Access ID user account. Third, thank to this dumb data transmission, we can watch the traffic to see all queries the application server makes after connecting to the DBMS under Connect ID. This includes SQL queries to select the Access ID and password. Therefore, any 3 Tier Developer can learn Access ID and the password. Attacks on front- end systems What can attackers do out of the Internet, only having access to front- end or, to be precise, to the PeopleSoft web application server? This is a typical situation, by the way. PS is often accessible from the Internet, especially HRMS systems used to publish job opportunities. Attacks through WebLogic As described above, PS is usually installed together with the WebLogic application server. And this is how the system is accessible out of the Internet. But a WL installed with PS has several special configuration features which impair the overall system security. For example, WL launches the management console on a local network interface by default. But for PS, it will be located on the same port as the PS Portal and thus available for external connections. Also, WL + PS have several default user accounts: system, operator, monitor. The password is usually password or Passw0rd. 9
10 system is a privileged user account which allows installing applications. Such an account gives one total control over WL. At the same time, operator and monitor have next to no rights. But our research has yielded a vulnerability. A significant share of authorization checks in WL is done on the client side. This means operator and monitor actually have more capabilities than the interface shows. As a result, we created an exploit which allows installing WL applications under operator or monitor. But WL has a restriction: you can only install applications from.war files stored in the file system of the server where WL is located. Local files, in other words. But we have bypassed this restriction using UNC paths. Windows handles these paths automatically, so we could install applications from a remote host by specifying the path as \\evil.host.com\shell.war Attacks from PeopleSoft servlets It is worth remembering that PS has several mandatory user accounts which are bruteforceable or guessable using a password dictionary. Two more facts can facilitate our attack. First, defense against bruteforce attacks is disabled in PS by default. Second, older systems set passwords which are similar to usernames for mandatory users. Newer systems use the password set for the PS user account during the system installation. In addition to the main Portal, PS has servlets. Most of them are used to interact with external systems. We have found XML external Entities injections in some of them. On top of the usual capabilities of reading plain- text files and conduct SSRF attacks, there were some usual features. For example, some servlets allowed reading XML files, other could do a directory listing. These XXEs enable a multitude of post- exploitation opportunities. Notably, the vulnerabilities were closed by Oracle quite quickly. At the same time, large mission- critical applications like PS are slow to update, so there must still be a lot of vulnerable systems. But what can we do with an XXE? For example, read a configuration file storing some kind of credentials. PS has multiple ways to store credentials in configuration files. First, plaintext. This is how Connect ID is usually stored. 10
11 Second, DES encryption. It is used in the older versions of PS. The important part is that a hardcoded key is used for this kind of encryption, so decrypting the data is not a problem. Third, 3DES is used in the newer systems. Theoretically, the key can be set manually. But the default key (similar for all PS applications) is used far more often. If the password has the prefix {V.1.1}, this is the case. Notably, the key is stored in the binary form in a separate file. Fourth, WL configuration files store passwords which are encrypted by AES using a new key every time. The key is stored in the binary form in a separate file. All in all, there are two main XXE attack vectors. 1. If we have network access to the RDBMS, we can read Connect ID, get Access ID and pwn PS DB. 2. From the multitude of configuration files, we can retrieve various accounts (in the case of v. 1.1 or an old PT version with DES). If an administrator re- uses a password, we can try to login with the PS account in Portal. Keep in mind that key is rarely changed on new systems (where 3DES is used). The reason is that there are a lot of configuration files where data is encrypted, but all passwords in those files have to be updated if the key is changed. There is no central point to change all passwords at once, so the task has to be done manually, which makes it a long process. If done incorrectly or incompletely, it can also damage the entire system. Yet another attack vector was found thanks to the servlets. There is a PS component called Integration Gateway. It is a framework for web services which is used to interact with various remote systems. The important thing is that it supports remote configuration. A specific request can allow reading or overwriting the IGW configuration. Of course it requires authentication, i. e. valid credentials. However: The username is almost always Administrator Defense against bruteforce attacks is disabled by default The default password is either password or the password used for the PS account upon installation This is a great opportunity for a password guessing attack. And if it succeeds, the guessed password may prove useful for other accounts when we get into the PS Portal. Special accounts there are known to rarely change their passwords after installation. 11
12 When we guess the password, we will be able to read and overwrite the IGW configuration file. It is an interesting capability since the configuration file contains lots of usernames and passwords (encrypted with DES/3DES) for various PS subsystems. Two more interesting opportunities are related to the configuration overwrite: to specify paths to Java classes used by IGW to handle requests, and to specify path to the XSL stylesheet used for incoming requests. Both opportunities enable code execution on the server. Unfortunately, we are yet to create a working exploit. Attack through PeopleSoft SSO Like many other enterprise business applications, PS supports various Single Sign- On technologies. SSO enables authenticating into several systems in a single move. A user logs into one system manually and into others automatically. Among others, PS supports its own SSO implementation based on the PS_TOKEN cookie. This is how it is used: 1. User logs into the first PS application 2. PS checks the user s credentials. If successful, it returns the session cookie and the PS_TOKEN cookie to the user 3. When the user tries to log into another PS server, their browser will automatically send the PS_TOKEN 4. The second PS server receives the PS_TOKEN, parses it, and authenticates the user if the cookie is correct Notably, PS_TOKEN is the only element used by the servers to exchange authentications (they have no back- end connection). And it is transmitted via client. Another important term is node. Simply speaking, a node is any system participating in SSO. Any application is a separate node. One application may also contain several nodes. Each node must have a name. Two settings are required to establish SSO between two servers. First, we have to specify the node name of each PS server at the other PS server. This is how it knows to trust the node with that name. Second, we have to give each node a Node Password. It must be the same for all PS servers. Therefore, the PS SSO is basically an implementation of the Pre- Shared Key technology. More details about the PS_TOKEN format. Aside from some additional technical fields at the beginning, it only has a few important values: UserID name of the user who has logged in 12
13 Lang the user s interface language Node Name name of the node which has authenticated the user Date And Time when the PS_TOKEN was issued Signature = SHA1_Hash (UserID + Lang + Node Name + Date And Time + Node Password) When a server gets a PS_TOKEN, it decodes the cookie (PS_TOKEN is encoded by base64), joins the four values with its Node Password, takes a SHA1 hash and compares it to the Signature in the PS_TOKEN. If they are equal, the cookie has not been modified, and the server authenticates the user under the User ID. Does it really look very secure? The only value in the Signature that the attacker does not already know is Node Password. If they can find a way to get the Node Password, they can forge a PS_TOKEN cookie with any User ID value, and the Signature will be correct. How does one get the Node Password, then? Easily: if we have any PS_TOKEN, we can take all important values out of it, add various passwords, and hash the result. If the hash is equal to the PS_TOKEN Signature, we have guessed the Node Password. I have written a tool called tokenchpoken which can parse, bruteforce, and recreate PS_TOKEN cookies. This attack may not seem dangerous enough because it only allows attacking systems where SSO is established. But there are two important nuances: Any PS application has at least one default local node. It is the node of the system itself. And it always trusts itself There are a lot of situations when an administrator have to set the node password for a default node Thus, even if you have never configured SSO for your PS and it is a standalone PS server, we can still attack it in the same way because we will still receive a PS_TOKEN after authentication. It s not all, though. The problem with this attack is that we need a PS user account. In other words, it is a classical privilege escalation attack. What do we do if we have no account? The PS design has more secrets. It s impossible to have access to some resources of a PS Portal without authentication. 13
14 But sometimes it s necessary. Imagine an HRMS portal on the Internet which needs to allow anonymous users to see the available jobs and leave an application. Another typical example is PS supporting password recovery. This will be the part of the system that an anonymous user can connect to. To solve such tasks, a special PS user is created who has minimal PS privileges and is configured to log it automatically. So if someone with no user account visits the anonymous PS application functionality, Ps will automatically authenticate them as a special user. What matters is that it will also issue a PS_TOKEN cookie. To sum up, we can attack a lot of PS application without any credentials. Notably, PS SSO is also used in other Oracle applications, like JD Edwards. This allows attacking them under certain circumstances, too. How to defend a PS system? Disable SSO completely Set up a very complex Node Password (max 24 symbols) Use certificates instead of Node Passwords 14
15 Conclusion Our research has revealed new facts and new attacks on PeopleSoft applications. Some of them can be resolved with patches, but most require correct PeopleSoft configuration, which, in turn, calls for a comprehensive understanding of the entire system. As for us, we intend to continue our research. 15
16 About the author Alexey Tyurin Head of security assessment department. Research areas: business application security, web security. Alexey is the head of security assessment department at ERPScan. He holds a Ph.D. in computer technologies. He has a wide experience of penetration testing for business applications (SAP, PeopleSoft, VMware, Citrix, etc.) and other enterprise applications. In addition, he is proficient in the security assessment of remote banking systems and core banking systems. Alexey s main interests are web security and searching for by- design vulns and complex attack vectors. He is the leading developer of ERPScan Pentesting Tool (a special pentester s toolkit for hacking SAP, PeopleSoft, MS Dynamics) and some other tools. 16
17 About ERPScan ERPScan is one of the most respected and credible Business Application Security providers. Founded in 2010, the company operates globally. Named an Emerging Vendor in Security by CRN and distinguished by 25+ other awards, ERPScan is the leading SAP SE partner in discovering and resolving security vulnerabilities. ERPScan consultants work with SAP SE in Walldorf to assist in improving the security of their latest solutions. ERPScan s primary mission is to close the gap between technical and business security, and provide solutions to evaluate and secure ERP systems and business- critical applications from both cyber- attacks and internal fraud. Usually our clients are large enterprises, Fortune 2000 companies, and managed service providers whose requirements are to actively monitor and manage security of vast SAP landscapes on a global scale. Our flagship product is ERPScan Security Monitoring Suite for SAP. This multi award- winning innovative software is the only solution in the market certified by SAP SE covering all tiers of SAP security i. e. vulnerability assessment, source code review, and Segregation of Duties. The largest companies from across diverse industries like oil and gas, banking, retail, even nuclear power installations as well as consulting companies have successfully deployed the software. ERPScan Monitoring Suite for SAP is specifically designed for enterprise systems to continuously monitor changes in multiple SAP systems. It generates and analyzes trends in user friendly dashboards, manages risks, tasks, and can export results to external systems. These features enable central management of SAP system security with minimal time and effort. We use the follow the sun principle and function in two hubs, located in the Netherlands and the US to operate local offices and partner network spanning 20+ countries around the globe. This enables monitoring cyber threats in real time while providing an agile customer support. 17
18 About ERPScan Research The company s expertise is based on the research subdivision of ERPScan, which is engaged in vulnerability research and analysis of critical enterprise applications. It has achieved multiple acknowledgments from the largest software vendors like SAP, Oracle, Microsoft, IBM, VMware, HP for exposing in excess of 400 vulnerabilities in their solutions (200 of them just in SAP!). ERPScan researchers are proud to expose new types of vulnerabilities (Top 10 Web Hacking Techniques 2012) and were nominated for the best server- side vulnerability at BlackHat ERPScan experts have been invited to speak, present and train at 60+ prime international security conferences in 25+ countries across the continents. These include BlackHat, RSA, HITB as well as private SAP trainings in several Fortune 2000 companies. ERPScan researchers lead the project EAS- SEC, which is focused on enterprise application security research and awareness. They have published 3 exhaustive annual award- winning surveys about SAP security. ERPScan experts have been interviewed by leading media resources and specialized infosec publications worldwide, these include Reuters, Yahoo, SC Magazine, The Register, CIO, PC World, DarkReading, Heise and Chinabyte to name a few. We have highly qualified experts in staff with experience in many different fields of security, from web applications and mobile/embedded to reverse engineering and ICS/SCADA systems, accumulating their experience to conduct research in SAP system security. 18
19 Our contacts Global Headquarters: 228 Hamilton Avenue, Fl. 3, Palo Alto, CA Phone: EMEA Headquarters: Luna ArenA 238 Herikerbergweg, 1101 CM Amsterdam Phone: Web: Contact: PR: 19
Invest in security to secure investments Oracle PeopleSoft applications are under attacks!
Invest in security to secure investments Oracle PeopleSoft applications are under attacks! Alexey Tyurin About ERPScan The only 360-degree SAP Security solution - ERPScan Security Monitoring Suite for
PRACTICAL PENTESTING OF ERP SYSTEMS AND BUSINESS
PRACTICAL PENTESTING OF ERP SYSTEMS AND BUSINESS APPLICATIONS VERSION 1.0 10.07.2013 Authors: Alexander Polyakov Alexey Tyurin With help of: Dmitry Chastukhin Dmitry Evdokimov Evgeny Neyolov www.erpscan.com
Thick Client Application Security
Thick Client Application Security Arindam Mandal ([email protected]) (http://www.paladion.net) January 2005 This paper discusses the critical vulnerabilities and corresponding risks in a two
Criteria for web application security check. Version 2015.1
Criteria for web application security check Version 2015.1 i Content Introduction... iii ISC- P- 001 ISC- P- 001.1 ISC- P- 001.2 ISC- P- 001.3 ISC- P- 001.4 ISC- P- 001.5 ISC- P- 001.6 ISC- P- 001.7 ISC-
How to hack VMware vcenter server in 60 seconds
Invest in security to secure investments How to hack VMware vcenter server in 60 seconds Alexey Sintsov, Alexander Minozhenko #whoami Pen-tester at ERPscan Company Researcher DCG#7812 CTF ERPScan Innovative
Penetration: from Application down to OS
April 13, 2010 Penetration: from Application down to OS Getting OS Access Using Lotus Domino Application Server Vulnerabilities Digitаl Security Research Group (DSecRG) www.dsecrg.com Alexandr Polyakov.
SECURITY TRENDS & VULNERABILITIES REVIEW 2015
SECURITY TRENDS & VULNERABILITIES REVIEW 2015 Contents 1. Introduction...3 2. Executive summary...4 3. Inputs...6 4. Statistics as of 2014. Comparative study of results obtained in 2013...7 4.1. Overall
Practical pentesting of ERP s and business applications
Invest in security to secure investments Practical pentesting of ERP s and business applications Alexander Polyakov CTO in ERPScan Alexey Tyurin Director of consulting department in ERPScan Alexander Polyakov
Integrigy Corporate Overview
mission critical applications mission critical security Application and Database Security Auditing, Vulnerability Assessment, and Compliance Integrigy Corporate Overview Integrigy Overview Integrigy Corporation
How to hack VMware vcenter server in 60 seconds
Invest in security to secure investments How to hack VMware vcenter server in 60 seconds Alexander Minozhenko #whoami Pen-tester at Digital Security Researcher DCG#7812 / Zeronights CTF Thanks for ideas
Inception of the SAP Platform's Brain Attacks on SAP Solution Manager
Inception of the SAP Platform's Brain Attacks on SAP Solution Manager Juan Perez-Etchegoyen [email protected] May 23 rd, 2012 HITB Conference, Amsterdam Disclaimer This publication is copyright 2012
If I want a perfect cyberweapon, I'll target ERP
If I want a perfect cyberweapon, I'll target ERP Alexander Polyakov / ERPScan Session ID: ADS-R07 Session Classification: Advanced Intro I hate CYBER talks and all that buzz I usually do more technical
Security and Control Issues within Relational Databases
Security and Control Issues within Relational Databases David C. Ogbolumani, CISA, CISSP, CIA, CISM Practice Manager Information Security Preview of Key Points The Database Environment Top Database Threats
Locking down a Hitachi ID Suite server
Locking down a Hitachi ID Suite server 2016 Hitachi ID Systems, Inc. All rights reserved. Organizations deploying Hitachi ID Identity and Access Management Suite need to understand how to secure its runtime
LISTSERV LDAP Documentation
LISTSERV LDAP Documentation L Soft Sweden AB 2007 28 November 2007 Overview LISTSERV version 15.5 can interface to LDAP servers to authenticate user logins, to insert LDAP attributes in mail merge distributions
EAS-SEC Project: Securing Enterprise Business Applications
EAS-SEC Project: Securing Enterprise Business Applications SESSION ID: SEC-W06 Alexander Polyakov CTO ERPScan @Twitter sh2kerr Alexander Polyakov CTO of the ERPScan inc EAS-SEC.org President Business application
Quest InTrust. Version 8.0. What's New. Active Directory Exchange Windows
Quest InTrust Version 8.0 What's New Active Directory Exchange Windows Abstract This document describes the new features and capabilities of Quest InTrust 8.0. Copyright 2004 Quest Software, Inc. and Quest
Too Critical To Fail Cyber-Attacks on ERP, CRM, SCM and HR Systems
Too Critical To Fail Cyber-Attacks on ERP, CRM, SCM and HR Systems SESSION ID: HTA-R01 Mariano Nunez CEO Onapsis Inc. @marianonunezdc Why Should We Care? Over 95% of the ERP systems analyzed were exposed
WHITE PAPER. FortiWeb and the OWASP Top 10 Mitigating the most dangerous application security threats
WHITE PAPER FortiWeb and the OWASP Top 10 PAGE 2 Introduction The Open Web Application Security project (OWASP) Top Ten provides a powerful awareness document for web application security. The OWASP Top
Web Intrusion Detection with ModSecurity. Ivan Ristic <[email protected]>
Web Intrusion Detection with ModSecurity Ivan Ristic Aim of This Talk Discuss the state of Web Intrusion Detection Introduce ModSecurity Introduce an open source web application
Guardium Change Auditing System (CAS)
Guardium Change Auditing System (CAS) Highlights. Tracks all changes that can affect the security of database environments outside the scope of the database engine Complements Guardium's Database Activity
Enabling Single Signon with IBM Cognos ReportNet and SAP Enterprise Portal
Guideline Enabling Single Signon with IBM Cognos ReportNet and SAP Enterprise Portal Product(s): IBM Cognos ReportNet Area of Interest: Security 2 Copyright Copyright 2008 Cognos ULC (formerly Cognos Incorporated).
CA Performance Center
CA Performance Center Single Sign-On User Guide 2.4 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation ) is
Managing Privileged Identities in the Cloud. How Privileged Identity Management Evolved to a Service Platform
Managing Privileged Identities in the Cloud How Privileged Identity Management Evolved to a Service Platform Managing Privileged Identities in the Cloud Contents Overview...3 Management Issues...3 Real-World
Enabling Single Signon with IBM Cognos 8 BI MR1 and SAP Enterprise Portal
Guideline Enabling Single Signon with IBM Cognos 8 BI MR1 and SAP Enterprise Portal Product: IBM Cognos 8 BI Area of Interest: Security 2 Copyright Copyright 2008 Cognos ULC (formerly Cognos Incorporated).
Top 10 most interesting SAP vulnerabilities and attacks Alexander Polyakov
Invest in security to secure investments Top 10 most interesting SAP vulnerabilities and attacks Alexander Polyakov CTO at ERPScan May 9, 2012 Me Business application security expert What is SAP? Shut
Security Threat Kill Chain What log data would you need to identify an APT and perform forensic analysis?
Security Threat Kill Chain What log data would you need to identify an APT and perform forensic analysis? This paper presents a scenario in which an attacker attempts to hack into the internal network
Lotus Domino Security
An X-Force White Paper Lotus Domino Security December 2002 6303 Barfield Road Atlanta, GA 30328 Tel: 404.236.2600 Fax: 404.236.2626 Introduction Lotus Domino is an Application server that provides groupware
Application Security Testing. Generic Test Strategy
Application Security Testing Generic Test Strategy Page 2 of 8 Contents 1 Introduction 3 1.1 Purpose: 3 1.2 Application Security Testing: 3 2 Audience 3 3 Test Strategy guidelines 3 3.1 Authentication
Penetration Testing: Advanced Oracle Exploitation Page 1
Penetration Testing: Advanced Oracle Exploitation Page 1 Course Index:: Day 1 Oracle RDBMS and the Oracle Network Architecture... 3» Introduction and Oracle Review...3» Service Information Enumeration:...3»
Securing Internet Facing. Applications. Technical White Paper. configuration drift, in which IT members open up ports or make small, supposedly
Securing Internet Facing Applications Ten years ago protecting the corporate network meant deploying traditional firewalls and intrusion detection solutions at the perimeter of the trusted network in order
Netop Remote Control Security Server
A d m i n i s t r a t i o n Netop Remote Control Security Server Product Whitepaper ABSTRACT Security is an important factor when choosing a remote support solution for any enterprise. Gone are the days
That Point of Sale is a PoS
SESSION ID: HTA-W02 That Point of Sale is a PoS Charles Henderson Vice President Managed Security Testing Trustwave @angus_tx David Byrne Senior Security Associate Bishop Fox Agenda POS Architecture Breach
Hacking Database for Owning your Data
Hacking Database for Owning your Data 1 Introduction By Abdulaziz Alrasheed & Xiuwei Yi Stealing data is becoming a major threat. In 2012 alone, 500 fortune companies were compromised causing lots of money
PeopleSoft Enterprise FSCM 9.1 Mobile Inventory Management Hardware and Software Requirements
PeopleSoft Enterprise FSCM 9.1 Mobile Inventory Management Hardware and Software Requirements FEBRUARY 2011 PeopleSoft Enterprise FSCM 9.1 Mobile Inventory Hardware and Software Requirements SKU ifscm91hwsw_021011
Using Foundstone CookieDigger to Analyze Web Session Management
Using Foundstone CookieDigger to Analyze Web Session Management Foundstone Professional Services May 2005 Web Session Management Managing web sessions has become a critical component of secure coding techniques.
WEB SECURITY CONCERNS THAT WEB VULNERABILITY SCANNING CAN IDENTIFY
WEB SECURITY CONCERNS THAT WEB VULNERABILITY SCANNING CAN IDENTIFY www.alliancetechpartners.com WEB SECURITY CONCERNS THAT WEB VULNERABILITY SCANNING CAN IDENTIFY More than 70% of all websites have vulnerabilities
InfoSec Academy Application & Secure Code Track
Fundamental Courses Foundational Courses InfoSec Academy Specialized Courses Advanced Courses Certification Preparation Courses Certified Information Systems Security Professional (CISSP) Texas Security
An Oracle White Paper Dec 2013. Oracle Access Management Security Token Service
An Oracle White Paper Dec 2013 Oracle Access Management Security Token Service Disclaimer The following is intended to outline our general product direction. It is intended for information purposes only,
Information Supplement: Requirement 6.6 Code Reviews and Application Firewalls Clarified
Standard: Data Security Standard (DSS) Requirement: 6.6 Date: February 2008 Information Supplement: Requirement 6.6 Code Reviews and Application Firewalls Clarified Release date: 2008-04-15 General PCI
How to break in. Tecniche avanzate di pen testing in ambito Web Application, Internal Network and Social Engineering
How to break in Tecniche avanzate di pen testing in ambito Web Application, Internal Network and Social Engineering Time Agenda Agenda Item 9:30 10:00 Introduction 10:00 10:45 Web Application Penetration
Oracle Identity Management for SAP in Heterogeneous IT Environments. An Oracle White Paper January 2007
Oracle Identity Management for SAP in Heterogeneous IT Environments An Oracle White Paper January 2007 Oracle Identity Management for SAP in Heterogeneous IT Environments Executive Overview... 3 Introduction...
Protecting Your Organisation from Targeted Cyber Intrusion
Protecting Your Organisation from Targeted Cyber Intrusion How the 35 mitigations against targeted cyber intrusion published by Defence Signals Directorate can be implemented on the Microsoft technology
Server Security. Contents. Is Rumpus Secure? 2. Use Care When Creating User Accounts 2. Managing Passwords 3. Watch Out For Aliases 4
Contents Is Rumpus Secure? 2 Use Care When Creating User Accounts 2 Managing Passwords 3 Watch Out For Aliases 4 Deploy A Firewall 5 Minimize Running Applications And Processes 5 Manage Physical Access
Auditing the Security of an SAP HANA Implementation
Produced by Wellesley Information Services, LLC, publisher of SAPinsider. 2015 Wellesley Information Services. All rights reserved. Auditing the Security of an SAP HANA Implementation Juan Perez-Etchegoyen
How To Protect A Web Application From Attack From A Trusted Environment
Standard: Version: Date: Requirement: Author: PCI Data Security Standard (PCI DSS) 1.2 October 2008 6.6 PCI Security Standards Council Information Supplement: Application Reviews and Web Application Firewalls
SAP. Penetration Testing. with Onapsis Bizploit. Mariano Nuñez. Di Croce. HITB Security Conference, Dubai. April 22, 2010. mnunez@onapsis.
SAP Penetration Testing with Onapsis Bizploit Mariano Nuñez Di Croce [email protected] April 22, 2010 HITB Security Conference, Dubai Disclaimer This publication is copyright Onapsis SRL 2010 All rights
Security Guide. BlackBerry Enterprise Service 12. for ios, Android, and Windows Phone. Version 12.0
Security Guide BlackBerry Enterprise Service 12 for ios, Android, and Windows Phone Version 12.0 Published: 2015-02-06 SWD-20150206130210406 Contents About this guide... 6 What is BES12?... 7 Key features
Leverage Active Directory with Kerberos to Eliminate HTTP Password
Leverage Active Directory with Kerberos to Eliminate HTTP Password PistolStar, Inc. PO Box 1226 Amherst, NH 03031 USA Phone: 603.547.1200 Fax: 603.546.2309 E-mail: [email protected] Website: www.pistolstar.com
Oracle Forms Services Secure Web.Show_Document() calls to Oracle Reports Server 6i
Oracle Forms Services Secure Web.Show_Document() calls to Oracle Reports Server 6i $Q2UDFOH7HFKQLFDO:KLWHSDSHU 0DUFK Secure Web.Show_Document() calls to Oracle Reports Server 6i Introduction...3 solution
User Pass-Through Authentication in IBM Cognos 8 (SSO to data sources)
User Pass-Through Authentication in IBM Cognos 8 (SSO to data sources) Nature of Document: Guideline Product(s): IBM Cognos 8 BI Area of Interest: Security Version: 1.2 2 Copyright and Trademarks Licensed
Securing Database Servers. Database security for enterprise information systems and security professionals
Securing Database Servers Database security for enterprise information systems and security professionals Introduction: Database servers are the foundation of virtually every Electronic Business, Financial,
The SAProuter An Internet Window to your SAP Platform (and beyond)
The SAProuter An Internet Window to your SAP Platform (and beyond) July 2, 2010 HITBSecConf, Amsterdam Disclaimer This publication is copyright 2010 Onapsis SRL All rights reserved. No portion of this
Enabling SSO between Cognos 8 and WebSphere Portal
Guideline Enabling SSO between Cognos 8 and WebSphere Portal Product(s): Cognos 8 Area of Interest: Security Enabling SSO between Cognos 8 and WebSphere Portal 2 Copyright Your use of this document is
Integrating IBM Cognos 8 BI with 3rd Party Auhtentication Proxies
Guideline Integrating IBM Cognos 8 BI with 3rd Party Auhtentication Proxies Product(s): IBM Cognos 8 BI Area of Interest: Security Integrating IBM Cognos 8 BI with 3rd Party Auhtentication Proxies 2 Copyright
Magento Security and Vulnerabilities. Roman Stepanov
Magento Security and Vulnerabilities Roman Stepanov http://ice.eltrino.com/ Table of contents Introduction Open Web Application Security Project OWASP TOP 10 List Common issues in Magento A1 Injection
Alliance Key Manager Solution Brief
Alliance Key Manager Solution Brief KEY MANAGEMENT Enterprise Encryption Key Management On the road to protecting sensitive data assets, data encryption remains one of the most difficult goals. A major
The Need for Real-Time Database Monitoring, Auditing and Intrusion Prevention
Whitepaper The Need for Real-Time Database Monitoring, Auditing and Intrusion Prevention May 2007 Copyright Sentrigo Ltd. 2007, All Rights Reserved The Challenge: Securing the Database Much of the effort
How To Use Attix5 Pro For A Fraction Of The Cost Of A Backup
Service Overview Business Cloud Backup Techgate s Business Cloud Backup service is a secure, fully automated set and forget solution, powered by Attix5, and is ideal for organisations with limited in-house
Xerox DocuShare Security Features. Security White Paper
Xerox DocuShare Security Features Security White Paper Xerox DocuShare Security Features Businesses are increasingly concerned with protecting the security of their networks. Any application added to a
How To Manage Web Content Management System (Wcm)
WEB CONTENT MANAGEMENT SYSTEM February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in
Plain English Guide To Common Criteria Requirements In The. Field Device Protection Profile Version 0.75
Plain English Guide To Common Criteria Requirements In The Field Device Protection Profile Version 0.75 Prepared For: Process Control Security Requirements Forum (PCSRF) Prepared By: Digital Bond, Inc.
SAST, DAST and Vulnerability Assessments, 1+1+1 = 4
SAST, DAST and Vulnerability Assessments, 1+1+1 = 4 Gordon MacKay Digital Defense, Inc. Chris Wysopal Veracode Session ID: Session Classification: ASEC-W25 Intermediate AGENDA Risk Management Challenges
Topics in Network Security
Topics in Network Security Jem Berkes MASc. ECE, University of Waterloo B.Sc. ECE, University of Manitoba www.berkes.ca February, 2009 Ver. 2 In this presentation Wi-Fi security (802.11) Protecting insecure
Appalachian Regional Commission Evaluation Report. Table of Contents. Results of Evaluation... 1. Areas for Improvement... 2
Report No. 13-35 September 27, 2013 Appalachian Regional Commission Table of Contents Results of Evaluation... 1 Areas for Improvement... 2 Area for Improvement 1: The agency should implement ongoing scanning
Phire Architect Hardware and Software Requirements
Phire Architect Hardware and Software Requirements Copyright 2014, Phire. All rights reserved. The Programs (which include both the software and documentation) contain proprietary information; they are
Security Architecture Whitepaper
Security Architecture Whitepaper 2015 by Network2Share Pty Ltd. All rights reserved. 1 Table of Contents CloudFileSync Security 1 Introduction 1 Data Security 2 Local Encryption - Data on the local computer
Exploiting Transparent User Identification Systems
Exploiting Transparent User Identification Systems Wayne Murphy Benjamin Burns Version 1.0a 1 CONTENTS 1.0 Introduction... 3 1.1 Project Objectives... 3 2.0 Brief Summary of Findings... 4 3.0 Background
elearning for Secure Application Development
elearning for Secure Application Development Curriculum Application Security Awareness Series 1-2 Secure Software Development Series 2-8 Secure Architectures and Threat Modeling Series 9 Application Security
Application Design and Development
C H A P T E R9 Application Design and Development Practice Exercises 9.1 What is the main reason why servlets give better performance than programs that use the common gateway interface (CGI), even though
National Endowment for the Arts Evaluation Report. Table of Contents. Results of Evaluation... 1. Areas for Improvement... 2. Exit Conference...
NEA OIG Report No. R-13-03 Table of Contents Results of Evaluation... 1 Areas for Improvement... 2 Area for Improvement 1: The agency should implement ongoing scanning to detect vulnerabilities... 2 Area
Penetration Test Report
Penetration Test Report MegaCorp One August 10 th, 2013 Offensive Security Services, LLC 19706 One Norman Blvd. Suite B #253 Cornelius, NC 28031 United States of America Tel: 1-402-608-1337 Fax: 1-704-625-3787
Actuality of SMBRelay in Modern Windows Networks
Actuality of SMBRelay in Modern Windows Networks Ares, April 2012 [email protected] http://sniff.su Intro I first came across SMBRelay in the middle of 2000s and the experience was unsatisfying..
External Penetration Assessment and Database Access Review
External Penetration Assessment and Database Access Review Performed by Protiviti, Inc. At the request of Internal Audit April 25, 2012 Note: This presentation is intended solely for the use of the management
Integrating VMware Horizon Workspace and VMware Horizon View TECHNICAL WHITE PAPER
Integrating VMware Horizon Workspace and VMware Horizon View TECHNICAL WHITE PAPER Table of Contents Introduction.... 3 Requirements.... 3 Horizon Workspace Components.... 3 SAML 2.0 Standard.... 3 Authentication
Enabling Single-Sign-On between IBM Cognos 8 BI and IBM WebSphere Portal
Guideline Enabling Single-Sign-On between IBM Cognos 8 BI and IBM WebSphere Portal Product(s): IBM Cognos 8 BI Area of Interest: Security Copyright Copyright 2008 Cognos ULC (formerly Cognos Incorporated).
Sygate Secure Enterprise and Alcatel
Sygate Secure Enterprise and Alcatel Sygate Secure Enterprise eliminates the damage or loss of information, cost of recovery, and regulatory violation due to rogue corporate computers, applications, and
Evaluation of different Open Source Identity management Systems
Evaluation of different Open Source Identity management Systems Ghasan Bhatti, Syed Yasir Imtiaz Linkoping s universitetet, Sweden [ghabh683, syeim642]@student.liu.se 1. Abstract Identity management systems
WHITE PAPER AUGUST 2014. Preventing Security Breaches by Eliminating the Need to Transmit and Store Passwords
WHITE PAPER AUGUST 2014 Preventing Security Breaches by Eliminating the Need to Transmit and Store Passwords 2 WHITE PAPER: PREVENTING SECURITY BREACHES Table of Contents on t Become the Next Headline
Oracle Enterprise Single Sign-on Provisioning Gateway. Administrator Guide Release 10.1.4.1.0 E12613-01
Oracle Enterprise Single Sign-on Provisioning Gateway Administrator Guide Release 10.1.4.1.0 E12613-01 March 2009 Oracle Enterprise Single Sign-on Provisioning Gateway, Administrator Guide, Release 10.1.4.1.0
Is Drupal secure? A high-level perspective on web vulnerabilities, Drupal s solutions, and how to maintain site security
Is Drupal secure? A high-level perspective on web vulnerabilities, Drupal s solutions, and how to maintain site security Presented 2009-05-29 by David Strauss Thinking Securely Security is a process, not
Oracle Security Auditing
Introduction - Commercial Slide. RISK 2008, Oslo, Norway, April 23 rd 2008 Oracle Security Auditing By Pete Finnigan Written Friday, 25th January 2008 Founded February 2003 CEO Pete Finnigan Clients UK,
Oracle Security Auditing
RISK 2008, Oslo, Norway, April 23 rd 2008 Oracle Security Auditing By Pete Finnigan Written Friday, 25th January 2008 1 Introduction - Commercial Slide. Founded February 2003 CEO Pete Finnigan Clients
McAfee Certified Product Specialist McAfee epolicy Orchestrator
McAfee Certified Product Specialist McAfee epolicy Orchestrator Exam preparation guide Table of Contents Introduction 3 Becoming McAfee Certified 3 Exam Details 3 Recommended Exam Preparation 4 Exam Objectives
Penetration Testing Report Client: Business Solutions June 15 th 2015
Penetration Testing Report Client: Business Solutions June 15 th 2015 Acumen Innovations 80 S.W 8 th St Suite 2000 Miami, FL 33130 United States of America Tel: 1-888-995-7803 Email: [email protected]
Passing PCI Compliance How to Address the Application Security Mandates
Passing PCI Compliance How to Address the Application Security Mandates The Payment Card Industry Data Security Standards includes several requirements that mandate security at the application layer. These
ATTACKS TO SAP WEB APPLICATIONS
ATTACKS TO SAP WEB APPLICATIONS by Mariano Nuñez Di Croce [email protected] BlackHat DC 2011 Briefings Abstract "SAP platforms are only accessible internally". While that was true in many organizations
iscsi Security (Insecure SCSI) Presenter: Himanshu Dwivedi
iscsi Security (Insecure SCSI) Presenter: Himanshu Dwivedi Agenda Introduction iscsi Attacks Enumeration Authorization Authentication iscsi Defenses Information Security Partners (isec) isec Partners Independent
Where every interaction matters.
Where every interaction matters. Peer 1 Vigilant Web Application Firewall Powered by Alert Logic The Open Web Application Security Project (OWASP) Top Ten Web Security Risks and Countermeasures White Paper
Last Updated: July 2011. STATISTICA Enterprise Server Security
Last Updated: July 2011 STATISTICA Enterprise Server Security STATISTICA Enterprise Server Security Page 2 of 10 Table of Contents Executive Summary... 3 Introduction to STATISTICA Enterprise Server...
Copyright: WhosOnLocation Limited
How SSO Works in WhosOnLocation About Single Sign-on By default, your administrators and users are authenticated and logged in using WhosOnLocation s user authentication. You can however bypass this and
BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note
BlackBerry Enterprise Service 10 Secure Work Space for ios and Android Version: 10.1.1 Security Note Published: 2013-06-21 SWD-20130621110651069 Contents 1 About this guide...4 2 What is BlackBerry Enterprise
Base One's Rich Client Architecture
Base One's Rich Client Architecture Base One provides a unique approach for developing Internet-enabled applications, combining both efficiency and ease of programming through its "Rich Client" architecture.
Threat Modeling. A workshop on how to create threat models by creating a hands-on example
Threat Modeling A workshop on how to create threat models by creating a hands-on example Introduction 2 Introduction 3 Part 1: Application- Layer Attacks A brief primer on some web application attacks
Penetration Testing with Kali Linux
Penetration Testing with Kali Linux PWK Copyright 2014 Offensive Security Ltd. All rights reserved. Page 1 of 11 All rights reserved to Offensive Security, 2014 No part of this publication, in whole or
Client Server Registration Protocol
Client Server Registration Protocol The Client-Server protocol involves these following steps: 1. Login 2. Discovery phase User (Alice or Bob) has K s Server (S) has hash[pw A ].The passwords hashes are
Invest in security to secure investments. Breaking SAP Portal. Dmitry Chastuhin Principal Researcher at ERPScan
Invest in security to secure investments Breaking SAP Portal Dmitry Chastuhin Principal Researcher at ERPScan 1 About ERPScan The only 360- degree SAP Security solu8on - ERPScan Security Monitoring Suite
SAP Business Objects Attacks: Espionage and Poisoning of BI Platforms
SAP Business Objects Attacks: Espionage and Poisoning of BI Platforms Title goes here 21/11/2014 Juan Perez-Etchegoyen [email protected] @jp_pereze 1 Disclaimer This presentation contains references
Metasploit The Elixir of Network Security
Metasploit The Elixir of Network Security Harish Chowdhary Software Quality Engineer, Aricent Technologies Shubham Mittal Penetration Testing Engineer, Iviz Security And Your Situation Would Be Main Goal
SAP Netweaver Application Server and Netweaver Portal Security
VU University Amsterdam SAP Netweaver Application Server and Netweaver Portal Security Author: Nick Kirtley Supervisors: Abbas Shahim, Frank Hakkennes Date: 28-09-2012 Organization: VU University Amsterdam,
