If I want a perfect cyberweapon, I'll target ERP
|
|
|
- Winfred French
- 10 years ago
- Views:
Transcription
1 If I want a perfect cyberweapon, I'll target ERP Alexander Polyakov / ERPScan Session ID: ADS-R07 Session Classification: Advanced
2 Intro I hate CYBER talks and all that buzz I usually do more technical presentations But everyone talks about it, why skip this area? My research is about Business Applications and ERP systems
3 Agenda Intro Big companies and critical systems What used to happen? How easy is that? What can happen? Forensics What can we do? Conclusion
4 Big companies Oil and Gas Manufacturing Logistics Financials Nuclear Retail Telecommunication etc.
5 What do they look like? Customers Branches CRM Warehouse BI ERP Industry Logistics Partners Banks Portal Billing Suppliers SRM HR Insurance
6 Are business applications popular? SAP More than 248,500 customers in 188 countries 86 % of Forbes 500 Oracle 100 % of Fortune 100 Microsoft More than businesses worldwide choose Microsoft Dynamics ERP and CRM software
7 What can happen? Espionage Stealing financial information Stealing corporate secrets Stealing supplier and customer lists Stealing HR data Sabotage Denial of service Modification of financial reports Access to technology network (SCADA) by trust relations Fraud False transactions Modification of master data
8 AutoCAD virus (Industrial espionage) AutoCAD virus Stealing critical documents Sending them potentially to China
9 PeopleSoft vulnerabilities (Sabotage) Presented at BlackHat USA Old and new issues The old one was a buffer overflow in a login page Over 500 systems can be found by googling New issues ranged from information disclosure to unauthorized system access Potential to steal the data of 20 million customers
10 US Department of Energy breached Sabotage Real example of stealing records Target: HR system (maybe PeopleSoft) Unauthorized disclosure of personally identifiable information about federal employees
11 Istanbul Provincial Administration Unauthorized disclosure of personally identifiable information about federal employees Debts of people erased
12 Media gossip about a potential Anonymous attack Now, it adds, We gained full access to the Greek Ministry of Finance. Those funky IBM servers don't look so safe now, do they... Anonymous claims to have a sweet 0day SAP exploit, and the group intends to sploit the hell out of it. * This attack has not been confirmed by the customer nor by the police authorities in Greece investigating the case. SAP does not have any indication that it happened.
13 Fraud There are several different methods used by vendors to defraud a company. Some of the more common methods include: Invoice company for a greater number of hours than worked Ghost employees of the vendor Vendor employees billed at amounts higher than contract rate Vendor employees billed at higher job classification than actual work performed (skilled vs. nonskilled labor rates) Invoice company for incorrect equipment or materials charges Vendor charges for equipment not needed or used for the job performed Vendor charges for materials not used or materials are for the personal benefit of company employee Vendor charges for equipment or material at higher prices than allowed by the contract Invoice company incorrectly for other services Vendor charges for services performed where work is not subject to audit clause Vendor charges include material purchases from or for work performed by related companies at inflated prices
14 Fraud The Association of Certified Fraud Examiners (ACFE) survey showed that US organizations lose an estimated 7% of annual revenues to fraud. Real examples that we met: Salary modification Material management fraud Mistaken transactions
15 Fraud PWC survey: out of 3000 organizations in 54 countries, 30 % were the victims of economic crime within the previous 12 months Average loss per organization for fraud: $ 500k + collateral damage Asset misappropriation: 83% Accounting fraud: 33%
16 Internet-Trading virus (Fraud) Internet-Trading virus (Fraud) Ranbys modification for QUIK trojan-spy.win32.broker.j for QUIK (stealing keys)
17 Project Mayhem (Fraud) Hacker could manipulate financial data and change entries to move funds to an outside account: alter the remittance address on vendor records create a new vendor and manual check entry change general ledger accounting records increase customer credit limit credit the balance in a customer account in order to get a refund showproof of concept microsoft erp hack
18 Fraud in Oil And Gas FRAUD and other infractions in Nigeria s critical oil and gas industry are enough to derail any stable economy, going by the report of the Petroleum Revenue Special Task Force by a former chairman of the Economic and Financial Crimes Commission (EFCC), Mallam Nuhu Ribadu
19 What can happen?
20 How to make it more Cyber/Danger Breach + worm Multiple attacks of the same type Against one country
21 What can happen next? Just imagine what could be done by breaking: One ERP system All business applications of a company All ERP systems in a particular country
22 How easy is that?
23 Ease of development Price of vulnerability is low Patching it is a nightmare Vaporization is easy Interconnection is high Availability via the Internet
24 Price of vulnerability Price of typical vulnerabilities in Flash and browsers goes higher Security of applications and OS is increasing It is much easier to find an architecture issue in ERP 2000 vulnerabilities closed only by SAP within 3 years And this kind of issue will work for years!
25 SAP security notes by year More than 2600 in total
26 Patching them is a nightmare You need to stop the processes Sometimes, you need to update multiple parts Examples of huge architectural issues in: Microsoft Dynamics Oracle JDE SAP SDM
27 Microsoft Dynamics authentication Dynamics security = only visual restrictions of fat client All users have rights in corporate databases The only obstruction: impossible to connect to the SQL server directly Reverse engineering to understand the password encryption algorithm Create a tool Every user can become an Administrator NO PATCH! Only new architecture can help (but there is none)
28 Oracle JD Edwards authentication All the security of JD Edwards relies on the visual restrictions of the fat client In fact, all users have rights to corporate data because the client connects using a special JDE account Then the username and password is checked on the fat client User can connect directly to database using a JDE account and modify their rights on table level Every user can become an Administrator NO PATCH! Only moving to 3-tier architecture
29 SAP SDM authentication Authentication is done by password hash It means that PassTheHash is possible First, hash can be simply sniffed, so it is like authenticating using a clear password Second, hashes are stored in an OS file so they can be accessed by using other vulnerabilities After getting a hash, it is possible to upload any backdoor into SAP To patch it: Modify client and server at the same time Install SAP Note
30 DEMO
31 Patching is a nightmare NetWeaver ABAP versions by popularity 6% 5% 11% 19% 23% 35% 7.0 EHP 0 (Nov 2005) 7.0 EHP 2 (Apr 2010) 7.0 EHP 1 (Oct 2008) 7.3 (Jun 2011) 6.2 (Dec 2003) 6.4 (Mar 2004) The most popular release (35 %, previously 45 %) is still NetWeaver 7.0, and it was released in 2005!
32 Special payload is not needed Remember Verb Tampering user creation? Just one request, and you are inside the system Another request, and you are the admin Then you can do whatever you want with simple HTTP requests If it is just a technical system, you can jump to connected systems
33 Systems are highly connected Systems are highly connected with each other by trust relations Even different companies are connected by ESB systems Remember SSRF? Second place in the top 10 web application techniques of 2012 Allows bypassing firewall restrictions and directly connecting to protected systems via connected systems
34 Business applications on the Internet Companies have Portals, SRMs, CRMs remotely accessible Companies connect different offices by ESB SAP users are connected to SAP via SAProuter Administrators open management interfaces to the Internet for remote control
35 Business applications on the Internet SAP HTTP services can be easily found on the Internet: inurl:/irj/portal inurl:/icieventservice sap inurl:/icieventservice/icieventconf inurl:/wsnavigator/jsps/test.jsp inurl:/irj/go/km/docs/
36 Shodan scan A total of 3741 server with different SAP web applications was found 120% Growth by application server 100% 20% 6% 34% SAP NetWeaver J2EE SAP NetWeaver ABAP 41% 80% 60% 40% 20% 0% 20% 40% 60% 94% 72% 30% -20% -55% SAP Web Application Server 80% Other (BusinessObjects,SAP Hosting, etc)
37 SAProuter Special application proxy Transfers requests from the Internet to SAP (and not only) Can work through VPN or SNC Almost every company uses it for connecting to SAP to download updates Usually listens to port 3299 Internet accessible (Approximately 5000 IPs )
38 SAProuter: known issues Absence of ACL: 15% Possible to proxy any request to any internal address Information disclosure about internal systems: 19% Denial of service by specifying many connections to any of the listed SAP servers Proxy requests to internal network if there is no ACL Insecure configuration, authentication bypass: 5% Heap corruption vulnerabilities: lots of them! To secure SAProuter, use SAP Note
39 DEMO
40 Port scan results Are you sure that only the necessary SAP services are exposed to the Internet? We were not In 2011, we ran a global project to scan all of the Internet for SAP services It is not completely finished yet, but we have the results for the top 1000 companies We were shocked when we saw them first
41 Port scan results Exposed services SAP HostControl SAP Dispatcher SAP MMC SAP Message Server httpd SAP Message Server SAP Router Listed services should not be accessible from the Internet
42 Why are there not many public examples of breaches if the situation is so bad?
43 Examples Fraud very popular inside companies but you see only some incidents Sabotage at this moment, it may be easier to DDoS than DoS, but we ll see Espionage here is what we don t see a lot of, because it is designed to be unseen. You will never know about it, especially if you don t enable logging
44 SAP security forensics There is not so many info in public Companies are not interested in publishing compromise But the main problem is: How can you be sure that there was no compromise? Only 10% of systems have Security Audit Log enabled Only few of them analyze those logs And much less do central storage and correlation * Based on the assessment of over 250 servers of companies that allowed us to share results
45 Percent of enabled log options ICM log icm/http/logging_0 70% Security audit log in ABAP 10% Table access logging rec/client 4% Message Server log ms/audit 2% SAP Gateway access log 2% * Based on the assessment of over 250 servers of the companies that allowed us to share results
46 Weapons
47 Weapons DoS for bank Fraud for oil, then manipulate prices and economy Multiple money transfer fraud
48 Prevention EAS SEC.org
49 EAS-SEC Resource which combines Guidelines for assessing enterprise application security News and articles about enterprise application security
50 EAS-SEC guidelines 1. Lack of patch management 2. Default passwords 3. Unnecessary enabled functionality 4. Remotely enabled administrative services 5. Insecure configuration 6. Unencrypted communications 7. Internal access control and SoD 8. Insecure trust relations 9. Monitoring of security events
51 Conclusion It is possible to be protected from almost all those kinds of issues, and we are working hard to make it secure Guides Regular security assessments Monitoring technical security Code review Segregation of duties EAS SEC project
52 Conclusion Issues are everywhere but the risks and price of mitigation are different
53 Future work I'd like to thank SAP Product Security Response Team for their great cooperation to make SAP systems more secure. Research is always ongoing, and we can't share all of it today. If you want to be the first to see new attacks and demos, follow us and attend future presentations: November 7 8 ZeroNights (Moscow, Russia) November 10 G0S (New Delhi, India)
54 Questions?
55 Thank you! Alexander Polyakov erpscan.com
EAS-SEC Project: Securing Enterprise Business Applications
EAS-SEC Project: Securing Enterprise Business Applications SESSION ID: SEC-W06 Alexander Polyakov CTO ERPScan @Twitter sh2kerr Alexander Polyakov CTO of the ERPScan inc EAS-SEC.org President Business application
THE STATE OF SAP SECURITY 2013: VULNERABILITIES, THREATS AND TRENDS
THE STATE OF SAP SECURITY 2013: VULNERABILITIES, THREATS AND TRENDS Alexander Polyakov ERPScan Session ID: DAS-T03 Session Classification: Intermediate Agenda SAP: Intro SAP: vulnerabilities SAP: threats
A GLOBAL SURVEY 2001 2013 Authors:
12 YEARS OF SAP SECURITY IN FIGURES: A GLOBAL SURVEY 2001 2013 Authors: Alexander Polyakov Alexey Tyurin Other contributors: Kirill Nikitenkov Evgeny Neyolov Alina Oprisko Dmitry Shimansky A GLOBAL SURVEY
Top 10 most interesting SAP vulnerabilities and attacks Alexander Polyakov
Invest in security to secure investments Top 10 most interesting SAP vulnerabilities and attacks Alexander Polyakov CTO at ERPScan May 9, 2012 Me Business application security expert What is SAP? Shut
Too Critical To Fail Cyber-Attacks on ERP, CRM, SCM and HR Systems
Too Critical To Fail Cyber-Attacks on ERP, CRM, SCM and HR Systems SESSION ID: HTA-R01 Mariano Nunez CEO Onapsis Inc. @marianonunezdc Why Should We Care? Over 95% of the ERP systems analyzed were exposed
Inception of the SAP Platform's Brain Attacks on SAP Solution Manager
Inception of the SAP Platform's Brain Attacks on SAP Solution Manager Juan Perez-Etchegoyen [email protected] May 23 rd, 2012 HITB Conference, Amsterdam Disclaimer This publication is copyright 2012
The SAProuter An Internet Window to your SAP Platform (and beyond)
The SAProuter An Internet Window to your SAP Platform (and beyond) July 2, 2010 HITBSecConf, Amsterdam Disclaimer This publication is copyright 2010 Onapsis SRL All rights reserved. No portion of this
Top 10 most interes.ng SAP vulnerabili.es and a9acks
Invest in security to secure investments Top 10 most interes.ng SAP vulnerabili.es and a9acks Alexander Polyakov CTO at ERPScan About ERPScan The only 360- degree SAP Security solu8on - ERPScan Security
SAP. Penetration Testing. with Onapsis Bizploit. Mariano Nuñez. Di Croce. HITB Security Conference, Dubai. April 22, 2010. mnunez@onapsis.
SAP Penetration Testing with Onapsis Bizploit Mariano Nuñez Di Croce [email protected] April 22, 2010 HITB Security Conference, Dubai Disclaimer This publication is copyright Onapsis SRL 2010 All rights
Detailed Description about course module wise:
Detailed Description about course module wise: Module 1: Basics of Networking and Major Protocols 1.1 Networks and its Types. 1.2 Network Topologies 1.3 Major Protocols and their Functions 1.4 OSI Reference
CYBER-ATTACKS & SAP SYSTEMS Is our business-critical infrastructure exposed?
CYBER-ATTACKS & SAP SYSTEMS Is our business-critical infrastructure exposed? by Mariano Nunez [email protected] Abstract Global Fortune 1000 companies, large governmental organizations and defense entities
Members of the UK cyber security forum. Soteria Health Check. A Cyber Security Health Check for SAP systems
Soteria Health Check A Cyber Security Health Check for SAP systems Soteria Cyber Security are staffed by SAP certified consultants. We are CISSP qualified, and members of the UK Cyber Security Forum. Security
Thick Client Application Security
Thick Client Application Security Arindam Mandal ([email protected]) (http://www.paladion.net) January 2005 This paper discusses the critical vulnerabilities and corresponding risks in a two
What s Wrong with Information Security Today? You are looking in the wrong places for the wrong things.
What s Wrong with Information Security Today? You are looking in the wrong places for the wrong things. AGENDA Current State of Information Security Data Breach Statics Data Breach Case Studies Why current
PRACTICAL PENTESTING OF ERP SYSTEMS AND BUSINESS
PRACTICAL PENTESTING OF ERP SYSTEMS AND BUSINESS APPLICATIONS VERSION 1.0 10.07.2013 Authors: Alexander Polyakov Alexey Tyurin With help of: Dmitry Chastukhin Dmitry Evdokimov Evgeny Neyolov www.erpscan.com
COURSE NAME: INFORMATION SECURITY INTERNSHIP PROGRAM
COURSE NAME: INFORMATION SECURITY INTERNSHIP PROGRAM Course Description This is the Information Security Training program. The Training provides you Penetration Testing in the various field of cyber world.
When a student leaves this intensive 5 day class they will have hands on understanding and experience in Ethical Hacking.
Ethical Hacking and Countermeasures Course Description: This class will immerse the student into an interactive environment where they will be shown how to scan, test, hack and secure their own systems.
CRYPTUS DIPLOMA IN IT SECURITY
CRYPTUS DIPLOMA IN IT SECURITY 6 MONTHS OF TRAINING ON ETHICAL HACKING & INFORMATION SECURITY COURSE NAME: CRYPTUS 6 MONTHS DIPLOMA IN IT SECURITY Course Description This is the Ethical hacking & Information
www.erpscan.com www.eas- sec.org
Analysis of 3000 vulnerabilities in SAP Disclaimer... 2 1. Intro... 3 2. Brief results... 4 3. General vulnerability statistics... 6 4. Number of acknowledgements to external researchers... 12 5. Vulnerabilities
SAP Netweaver Application Server and Netweaver Portal Security
VU University Amsterdam SAP Netweaver Application Server and Netweaver Portal Security Author: Nick Kirtley Supervisors: Abbas Shahim, Frank Hakkennes Date: 28-09-2012 Organization: VU University Amsterdam,
Invest in security to secure investments. Breaking SAP Portal. Dmitry Chastuhin Principal Researcher at ERPScan
Invest in security to secure investments Breaking SAP Portal Dmitry Chastuhin Principal Researcher at ERPScan 1 About ERPScan The only 360- degree SAP Security solu8on - ERPScan Security Monitoring Suite
SAP Business Objects Attacks: Espionage and Poisoning of BI Platforms
SAP Business Objects Attacks: Espionage and Poisoning of BI Platforms Title goes here 21/11/2014 Juan Perez-Etchegoyen [email protected] @jp_pereze 1 Disclaimer This presentation contains references
Auditing the Security of an SAP HANA Implementation
Produced by Wellesley Information Services, LLC, publisher of SAPinsider. 2015 Wellesley Information Services. All rights reserved. Auditing the Security of an SAP HANA Implementation Juan Perez-Etchegoyen
Secure Web Applications. The front line defense
Secure Web Applications The front line defense Agenda Web Application Security Threat Overview Exploiting Web Applications Common Attacks & Preventative techniques Developing Secure Web Applications -Security
Penetration: from Application down to OS
April 13, 2010 Penetration: from Application down to OS Getting OS Access Using Lotus Domino Application Server Vulnerabilities Digitаl Security Research Group (DSecRG) www.dsecrg.com Alexandr Polyakov.
Evolution of Penetration Testing
Alexander Polyakov, QSA,PA-QSA CTO Digital Security (dsec.ru) Head of DSecRG (dsecrg.com) ERPSCAN Architect (erpscan.com) Head of OWASP-EAS Pentests? Again? Why? Many companies are doing this Many companies
2012 Data Breach Investigations Report
2012 Data Breach Investigations Report A study conducted by the Verizon RISK Team with cooperation from the Australian Federal Police, Dutch National High Tech Crime Unit, Irish Reporting & Information
Forgotten World: Corporate Business Application Systems
Forgotten World: Corporate Business Application Systems Alexander Polyakov (dsecrg.com) Val Smith (AttackResearch.com) BlackHat DC 2011 1. Abstract... 3 2. Intro... 4 2.1. Threat... 4 2.2. Introduction
Andreas Mertz (Founder/Man. Dir. it-cube SYSTEMS, CISSP) 360 SAP Security
Andreas Mertz (Founder/Man. Dir. it-cube SYSTEMS, CISSP) 360 SAP Security Agenda Motivation SAP Threat Vectors / SAP Hack Solution Approach the 360 of agilesi Threat Detection Secenarios / SIEM use cases
Virtualization System Security
Virtualization System Security Bryan Williams, IBM X-Force Advanced Research Tom Cross, Manager, IBM X-Force Security Strategy 2009 IBM Corporation Overview Vulnerability disclosure analysis Vulnerability
Cyber - Security and Investigations. Ingrid Beierly August 18, 2008
Cyber - Security and Investigations Ingrid Beierly August 18, 2008 Agenda Visa Cyber - Security and Investigations Today s Targets Recent Attack Patterns Hacking Statistics (removed) Top Merchant Vulnerabilities
Alexander Polyakov CTO ERPScan
Invest in security to secure investments ERP Security. Myths, Problems, Solu6ons Alexander Polyakov CTO ERPScan About ERPScan The only 360- degree SAP Security solu8on - ERPScan Security Monitoring Suite
Hacking Database for Owning your Data
Hacking Database for Owning your Data 1 Introduction By Abdulaziz Alrasheed & Xiuwei Yi Stealing data is becoming a major threat. In 2012 alone, 500 fortune companies were compromised causing lots of money
CCM 4350 Week 11. Security Architecture and Engineering. Guest Lecturer: Mr Louis Slabbert School of Science and Technology.
CCM 4350 Week 11 Security Architecture and Engineering Guest Lecturer: Mr Louis Slabbert School of Science and Technology CCM4350_CNSec 1 Web Server Security The Web is the most visible part of the net
Web Application Security
Web Application Security Ng Wee Kai Senior Security Consultant PulseSecure Pte Ltd About PulseSecure IT Security Consulting Company Part of Consortium in IDA (T) 606 Term Tender Cover most of the IT Security
Invest in security to secure investments Oracle PeopleSoft applications are under attacks!
Invest in security to secure investments Oracle PeopleSoft applications are under attacks! Alexey Tyurin About ERPScan The only 360-degree SAP Security solution - ERPScan Security Monitoring Suite for
SAP Certified Technology Professional - Security with SAP NetWeaver 7.0. Title : Version : Demo. The safer, easier way to help you pass any IT exams.
Exam : P_ADM_SEC_70 Title : SAP Certified Technology Professional - Security with SAP NetWeaver 7.0 Version : Demo 1 / 5 1.Which of the following statements regarding SSO and SAP Logon Tickets are true?
Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006
Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006 April 2013 Hologic and the Hologic Logo are trademarks or registered trademarks of Hologic, Inc. Microsoft, Active Directory,
OPC & Security Agenda
OPC & Security Agenda Cyber Security Today Cyber Security for SCADA/IS OPC Security Overview OPC Security Products Questions & Answers 1 Introduction CYBER SECURITY TODAY The Need for Reliable Information
External Penetration Assessment and Database Access Review
External Penetration Assessment and Database Access Review Performed by Protiviti, Inc. At the request of Internal Audit April 25, 2012 Note: This presentation is intended solely for the use of the management
Topics in Network Security
Topics in Network Security Jem Berkes MASc. ECE, University of Waterloo B.Sc. ECE, University of Manitoba www.berkes.ca February, 2009 Ver. 2 In this presentation Wi-Fi security (802.11) Protecting insecure
Application Security Testing
Tstsec - Version: 1 09 July 2016 Application Security Testing Application Security Testing Tstsec - Version: 1 4 days Course Description: We are living in a world of data and communication, in which the
Common Cyber Threats. Common cyber threats include:
Common Cyber Threats: and Common Cyber Threats... 2 Phishing and Spear Phishing... 3... 3... 4 Malicious Code... 5... 5... 5 Weak and Default Passwords... 6... 6... 6 Unpatched or Outdated Software Vulnerabilities...
Fundamentals of Information Systems Security Unit 1 Information Systems Security Fundamentals
Fundamentals of Information Systems Security Unit 1 Information Systems Security Fundamentals Learning Objective Explain the concepts of information systems security (ISS) as applied to an IT infrastructure.
2. From a control perspective, the PRIMARY objective of classifying information assets is to:
MIS5206 Week 13 Your Name Date 1. When conducting a penetration test of an organization's internal network, which of the following approaches would BEST enable the conductor of the test to remain undetected
STOPPING LAYER 7 ATTACKS with F5 ASM. Sven Müller Security Solution Architect
STOPPING LAYER 7 ATTACKS with F5 ASM Sven Müller Security Solution Architect Agenda Who is targeted How do Layer 7 attacks look like How to protect against Layer 7 attacks Building a security policy Layer
Database Auditing: Best Practices. Rob Barnes, CISA Director of Security, Risk and Compliance Operations [email protected]
Database Auditing: Best Practices Rob Barnes, CISA Director of Security, Risk and Compliance Operations [email protected] Verizon 2009 Data Breach Investigations Report: 285 million records were compromised
The Key to Secure Online Financial Transactions
Transaction Security The Key to Secure Online Financial Transactions Transferring money, shopping, or paying debts online is no longer a novelty. These days, it s just one of many daily occurrences on
Securing Your Web Application against security vulnerabilities. Ong Khai Wei, IT Specialist, Development Tools (Rational) IBM Software Group
Securing Your Web Application against security vulnerabilities Ong Khai Wei, IT Specialist, Development Tools (Rational) IBM Software Group Agenda Security Landscape Vulnerability Analysis Automated Vulnerability
FORBIDDEN - Ethical Hacking Workshop Duration
Workshop Course Module FORBIDDEN - Ethical Hacking Workshop Duration Lecture and Demonstration : 15 Hours Security Challenge : 01 Hours Introduction Security can't be guaranteed. As Clint Eastwood once
Who is Watching You? Video Conferencing Security
Who is Watching You? Video Conferencing Security Navid Jam Member of Technical Staff March 1, 2007 SAND# 2007-1115C Computer and Network Security Security Systems and Technology Video Conference and Collaborative
SAP SECURITY CLEARING THE CONFUSION AND TAKING A HOLISTIC APPROACH
SAP SECURITY CLEARING THE CONFUSION AND TAKING A HOLISTIC APPROACH WWW.MANTRANCONSULTING.COM 25 Mar 2011, ISACA Singapore SOD SAS70 Project Controls Infrastructure security Configurable controls Change
ATTACKS TO SAP WEB APPLICATIONS
ATTACKS TO SAP WEB APPLICATIONS by Mariano Nuñez Di Croce [email protected] BlackHat DC 2011 Briefings Abstract "SAP platforms are only accessible internally". While that was true in many organizations
Cyber Security for SCADA/ICS Networks
Cyber Security for SCADA/ICS Networks GANESH NARAYANAN HEAD-CONSULTING CYBER SECURITY SERVICES www.thalesgroup.com Increasing Cyber Attacks on SCADA / ICS Systems 2 What is SCADA Supervisory Control And
Application Security Best Practices. Wally LEE <[email protected]> Principal Consultant
Application Security Best Practices Wally LEE Principal Consultant 17/18 March 2009 Speaker Profile Wally LEE CISSP BS7799 Lead Auditor Certified Ultimate Hacking Instructor Certified
Web Application Security
Web Application Security Prof. Sukumar Nandi Indian Institute of Technology Guwahati Agenda Web Application basics Web Network Security Web Host Security Web Application Security Best Practices Questions?
By: Gerald Gagne. Community Bank Auditors Group Cybersecurity What you need to do now. June 9, 2015
Community Bank Auditors Group Cybersecurity What you need to do now June 9, 2015 By: Gerald Gagne MEMBER OF PKF NORTH AMERICA, AN ASSOCIATION OF LEGALLY INDEPENDENT FIRMS 2015 Wolf & Company, P.C. Cybersecurity
20-CS-6053-00X Network Security Spring, 2014. An Introduction To. Network Security. Week 1. January 7
20-CS-6053-00X Network Security Spring, 2014 An Introduction To Network Security Week 1 January 7 Attacks Criminal: fraud, scams, destruction; IP, ID, brand theft Privacy: surveillance, databases, traffic
The Top Web Application Attacks: Are you vulnerable?
QM07 The Top Web Application Attacks: Are you vulnerable? John Burroughs, CISSP Sr Security Architect, Watchfire Solutions [email protected] Agenda Current State of Web Application Security Understanding
Achieving Compliance with the PCI Data Security Standard
Achieving Compliance with the PCI Data Security Standard June 2006 By Alex Woda, MBA, CISA, QDSP, QPASP This article describes the history of the Payment Card Industry (PCI) data security standards (DSS),
Guidelines for Website Security and Security Counter Measures for e-e Governance Project
and Security Counter Measures for e-e Governance Project Mr. Lalthlamuana PIO, DoICT Background (1/8) Nature of Cyber Space Proliferation of Information Technology Rapid Growth in Internet Increasing Online
WHITE PAPER. FortiWeb and the OWASP Top 10 Mitigating the most dangerous application security threats
WHITE PAPER FortiWeb and the OWASP Top 10 PAGE 2 Introduction The Open Web Application Security project (OWASP) Top Ten provides a powerful awareness document for web application security. The OWASP Top
Cyber Security In High-Performance Computing Environment Prakashan Korambath Institute for Digital Research and Education, UCLA July 17, 2014
Cyber Security In High-Performance Computing Environment Prakashan Korambath Institute for Digital Research and Education, UCLA July 17, 2014 Introduction: Cyber attack is an unauthorized access to a computer
Attacks to SAP. Web Applications Your crown jewels online. Mariano Nuñez Di Croce. Troopers, Germany. March 30th, 2011. mnunez@onapsis.
Attacks to SAP Web Applications Your crown jewels online Mariano Nuñez Di Croce [email protected] March 30th, 2011 Troopers, Germany Disclaimer This publication is copyright 2011 Onapsis SRL All rights
13 Ways Through A Firewall
Industrial Control Systems Joint Working Group 2012 Fall Meeting 13 Ways Through A Firewall Andrew Ginter Director of Industrial Security Waterfall Security Solutions Proprietary Information -- Copyright
Network Security. Tampere Seminar 23rd October 2008. Overview Switch Security Firewalls Conclusion
Network Security Tampere Seminar 23rd October 2008 1 Copyright 2008 Hirschmann 2008 Hirschmann Automation and and Control GmbH. Contents Overview Switch Security Firewalls Conclusion 2 Copyright 2008 Hirschmann
IBM Managed Security Services Vulnerability Scanning:
IBM Managed Security Services August 2005 IBM Managed Security Services Vulnerability Scanning: Understanding the methodology and risks Jerry Neely Network Security Analyst, IBM Global Services Page 2
Barracuda Web Site Firewall Ensures PCI DSS Compliance
Barracuda Web Site Firewall Ensures PCI DSS Compliance E-commerce sales are estimated to reach $259.1 billion in 2007, up from the $219.9 billion earned in 2006, according to The State of Retailing Online
End-user Security Analytics Strengthens Protection with ArcSight
Case Study for XY Bank End-user Security Analytics Strengthens Protection with ArcSight INTRODUCTION Detect and respond to advanced persistent threats (APT) in real-time with Nexthink End-user Security
SECURING YOUR REMOTE DESKTOP CONNECTION
White Paper SECURING YOUR REMOTE DESKTOP CONNECTION HOW TO PROPERLY SECURE REMOTE ACCESS 2015 SecurityMetrics SECURING YOUR REMOTE DESKTOP CONNECTION 1 SECURING YOUR REMOTE DESKTOP CONNECTION HOW TO PROPERLY
Things I can do to protect my network from getting Hacked!!!!!! Jazib Frahim, Technical Leader
Things I can do to protect my network from getting Hacked!!!!!! Jazib Frahim, Technical Leader Cisco Support Community Expert Series Webcast Today s featured expert is Cisco Technical Leader Ask him questions
Certified Ethical Hacker Exam 312-50 Version Comparison. Version Comparison
CEHv8 vs CEHv7 CEHv7 CEHv8 19 Modules 20 Modules 90 Labs 110 Labs 1700 Slides 1770 Slides Updated information as per the latest developments with a proper flow Classroom friendly with diagrammatic representation
Achieving PCI Compliance Using F5 Products
Achieving PCI Compliance Using F5 Products Overview In April 2000, Visa launched its Cardholder Information Security Program (CISP) -- a set of mandates designed to protect its cardholders from identity
What is Web Security? Motivation
[email protected] http://www.brucker.ch/ Information Security ETH Zürich Zürich, Switzerland Information Security Fundamentals March 23, 2004 The End Users View The Server Providers View What is Web
Oracle Database Security. Nathan Aaron ICTN 4040 Spring 2006
Oracle Database Security Nathan Aaron ICTN 4040 Spring 2006 Introduction It is important to understand the concepts of a database before one can grasp database security. A generic database definition is
SAP SECURITY AND AUTHORIZATIONS - RISK MANAGEMENT AND COMPLIANCE WITH LEGAL REGULATIONS IN THE SAP ENVIRONMENT
SAP SECURITY AND AUTHORIZATIONS - RISK MANAGEMENT AND COMPLIANCE WITH LEGAL REGULATIONS IN THE SAP ENVIRONMENT Foreword by Prof. Wolfgang Lassmann... 15 Foreword by Dr. Sachar Paulus... 17 1 Introduction...
STABLE & SECURE BANK lab writeup. Page 1 of 21
STABLE & SECURE BANK lab writeup 1 of 21 Penetrating an imaginary bank through real present-date security vulnerabilities PENTESTIT, a Russian Information Security company has launched its new, eighth
Host Hardening. Presented by. Douglas Couch & Nathan Heck Security Analysts for ITaP 1
Host Hardening Presented by Douglas Couch & Nathan Heck Security Analysts for ITaP 1 Background National Institute of Standards and Technology Draft Guide to General Server Security SP800-123 Server A
Global Partner Management Notice
Global Partner Management Notice Subject: Critical Vulnerabilities Identified to Alert Payment System Participants of Data Compromise Trends Dated: May 4, 2009 Announcement: To support compliance with
ICTN 4040. Enterprise Database Security Issues and Solutions
Huff 1 ICTN 4040 Section 001 Enterprise Information Security Enterprise Database Security Issues and Solutions Roger Brenton Huff East Carolina University Huff 2 Abstract This paper will review some of
External Supplier Control Requirements
External Supplier Control s Cyber Security For Suppliers Categorised as Low Cyber Risk 1. Asset Protection and System Configuration Barclays Data and the assets or systems storing or processing it must
Passing PCI Compliance How to Address the Application Security Mandates
Passing PCI Compliance How to Address the Application Security Mandates The Payment Card Industry Data Security Standards includes several requirements that mandate security at the application layer. These
THE ROLE OF IDS & ADS IN NETWORK SECURITY
THE ROLE OF IDS & ADS IN NETWORK SECURITY The Role of IDS & ADS in Network Security When it comes to security, most networks today are like an egg: hard on the outside, gooey in the middle. Once a hacker
Security Threat Kill Chain What log data would you need to identify an APT and perform forensic analysis?
Security Threat Kill Chain What log data would you need to identify an APT and perform forensic analysis? This paper presents a scenario in which an attacker attempts to hack into the internal network
This session was presented by Jim Stickley of TraceSecurity on Wednesday, October 23 rd at the Cyber Security Summit.
The hidden risks of mobile applications This session was presented by Jim Stickley of TraceSecurity on Wednesday, October 23 rd at the Cyber Security Summit. To learn more about TraceSecurity visit www.tracesecurity.com
Network Incident Report
To submit copies of this form via facsimile, please FAX to 202-406-9233. Network Incident Report United States Secret Service Financial Crimes Division Electronic Crimes Branch Telephone: 202-406-5850
The Business Case for Security Information Management
The Essentials Series: Security Information Management The Business Case for Security Information Management sponsored by by Dan Sullivan Th e Business Case for Security Information Management... 1 Un
Security Testing in Critical Systems
Security Testing in Critical Systems An Ethical Hacker s View Peter Wood Chief Executive Officer First Base Technologies Who is Peter Wood? Worked in computers & electronics since 1969 Founded First Base
Whitepaper on AuthShield Two Factor Authentication with ERP Applications
Whitepaper on AuthShield Two Factor Authentication with ERP Applications By INNEFU Labs Pvt. Ltd Table of Contents 1. Overview... 3 2. Threats to account passwords... 4 2.1 Social Engineering or Password
How To Set Up An Ip Firewall On Linux With Iptables (For Ubuntu) And Iptable (For Windows)
Security principles Firewalls and NAT These materials are licensed under the Creative Commons Attribution-Noncommercial 3.0 Unported license (http://creativecommons.org/licenses/by-nc/3.0/) Host vs Network
INDUSTRIAL CONTROL SYSTEMS CYBER SECURITY DEMONSTRATION
INDUSTRIAL CONTROL SYSTEMS CYBER SECURITY DEMONSTRATION Prepared for the NRC Fuel Cycle Cyber Security Threat Conference Presented by: Jon Chugg, Ken Rohde Organization(s): INL Date: May 30, 2013 Disclaimer
Media Shuttle s Defense-in- Depth Security Strategy
Media Shuttle s Defense-in- Depth Security Strategy Introduction When you are in the midst of the creative flow and tedious editorial process of a big project, the security of your files as they pass among
TABLE OF CONTENT. Page 2 of 9 INTERNET FIREWALL POLICY
IT FIREWALL POLICY TABLE OF CONTENT 1. INTRODUCTION... 3 2. TERMS AND DEFINITION... 3 3. PURPOSE... 5 4. SCOPE... 5 5. POLICY STATEMENT... 5 6. REQUIREMENTS... 5 7. OPERATIONS... 6 8. CONFIGURATION...
HIPAA Security: Gap Analysis, Vulnerability Assessments, and Countermeasures
HIPAA Security: Gap Analysis, Vulnerability Assessments, and Countermeasures Don Hewitt and Chris Goggans March 1, 2001 Copyright 2001 by Security Design International, Inc. 1 Agenda The Proposed Rule
Penetration Testing Using The Kill Chain Methodology
Penetration Testing Using The Kill Chain Methodology Presented by: Rupert Edwards This course is intended for a technically astute audience.this course is 98% hands on.the attendee should have some basic
