SAP Business Objects Attacks: Espionage and Poisoning of BI Platforms



Similar documents
Inception of the SAP Platform's Brain Attacks on SAP Solution Manager

The SAProuter An Internet Window to your SAP Platform (and beyond)

CYBER-ATTACKS & SAP SYSTEMS Is our business-critical infrastructure exposed?

SAP. Penetration Testing. with Onapsis Bizploit. Mariano Nuñez. Di Croce. HITB Security Conference, Dubai. April 22,

ATTACKS TO SAP WEB APPLICATIONS

SAP MOBILE: ATTACK & DEFENSE

INTELLIGENCE AND HOMELAND DEFENSE INSIGHT

How To Upgrade Your System With Bib

SAP BusinessObjects Edge BI, Preferred Business Intelligence. SAP BusinessObjects Portfolio SAP Solutions for Small Businesses and Midsize Companies

SAP BusinessObjects SOLUTIONS FOR ORACLE ENVIRONMENTS

Auditing the Security of an SAP HANA Implementation

SAP Security Recommendations December Secure Software Development at SAP Embedding Security in the Product Innovation Lifecycle Version 1.

Too Critical To Fail Cyber-Attacks on ERP, CRM, SCM and HR Systems

BUSINESS-DRIVEN, COMPLIANT IDENTITY MANAGEMENT USING SAP NetWeaver IDENTITY MANAGEMENT

SAP BW on HANA & HANA Smart Data Access Setup

By Makesh Kannaiyan 8/27/2011 1

SAP BusinessObjects Query as a Web Service Designer SAP BusinessObjects Business Intelligence platform 4.0

LHI Leasing Simplifying and Automating the IT Landscape with SAP Software. SAP Customer Success Story Financial Services Provider LHI Leasing

Attacks to SAP. Web Applications Your crown jewels online. Mariano Nuñez Di Croce. Troopers, Germany. March 30th,

Open Items Analytics Dashboard System Configuration

Nine Reasons Why SAP Rapid Deployment Solutions Can Make Your Life Easier Get Where You Want to Be, One Step at a Time

SAP BusinessObjects Edge BI, Standard Package Preferred Business Intelligence Choice for Growing Companies

LVS Troubleshooting Common issues and solutions

How To Use Sap Business Objects For Microsoft (For Microsoft) For Microsoft (For Pax) For Pax (For Sap) For Spera) For A Business Intelligence (Bio) Solution

Certification Guide Network Connectivity for SAP on Premise and Cloud Solutions Integration

SAP BusinessObjects Business Intelligence 4 Innovation and Implementation

Application Lifecycle Management

Welcome to the Technical Stream

Securing Your Web Application against security vulnerabilities. Ong Khai Wei, IT Specialist, Development Tools (Rational) IBM Software Group

Meeting the Challenges of

SAP BO 4.1 COURSE CONTENT

UI Framework Simple Search in CRM WebClient based on NetWeaver Enterprise Search (ABAP) SAP Enhancement Package 1 for SAP CRM 7.0

BICS Connectivity for Web Intelligence in SAP BI 4.0. John Mrozek / AGS December 01, 2011

Compare & Adjust How to Guide for Compare & Adjust in SAP Solution Manager Application Lifecycle Management

SAP BusinessObjects Dashboards

ENTERPRISE SYSTEMS. ERP Architecture through 3 eras 9/5/2010. Fall Information Systems Implementation

SAP PartnerEdge Program: Opportunities for SAP-Authorized Resellers

SAP BusinessObjects Business Intelligence 4.1 One Strategy for Enterprise BI. May 2013

Sybase ASE Linux Installation Guide Installation and getting started guide for SAP Sybase ASE on Linux

SAP BusinessObjects Business Intelligence Suite Document Version: 4.1 Support Package Patch 3.x Update Guide

SAP BusinessObjects Dashboarding Strategy and Statement of Direction

How To Understand And Understand The Basic Principles Of An Ansper System

SAP Working Capital Analytics Overview. SAP Business Suite Application Innovation January 2014

Business Intelligence Competency Partners

SAP Archiving and SAP Document Access

SAP Business ByDesign and SAP ERP. SAP Business ByDesign for Subsidiaries Overview of Functional and Technical Integration with Headquarters SAP ERP

Five Strategies Small and Medium Enterprises Can Use to Successfully Implement High Value Business Mobility

Crystal Server Upgrade Guide SAP Crystal Server 2013

SAP Portfolio and Project Management

Streamlined Planning and Consolidation for Finance Teams in Any Organization

Data Governance. Data Governance, Data Architecture, and Metadata Essentials Enabling Data Reuse Across the Enterprise

SAP NetWeaver & Enterprise Services Architecture

Tips and Tricks for Deploying BI Web Services Within Your Web Intelligence Environment Chris Greer EV Technologies

How-to guide: Monitoring of standalone Hosts. This guide explains how you can enable monitoring for standalone hosts in SAP Solution Manager

Platform Architecture Evolution : SAP BO Enterprise XI (R2) to SAP BO Enterprise XI (3.1) to SAP BusinessObjects Business Intelligence Platform 4.

Protect Your Connected Business Systems by Identifying and Analyzing Threats

SAP Business Objects BO BI 4.1

Business Intelligence Competency Partners

ERP Quotation and Sales Order in CRM WebClient UI Detailed View. SAP Enhancement Package 1 for SAP CRM 7.0 CRM Sales - SFA

ITM204 Post-Copy Automation for SAP NetWeaver Business Warehouse System Landscapes. October 2013

SAP Business Intelligence Adoption V6.41: Software and Delivery Requirements. SAP Business Intelligence Adoption February 2015 English

Understanding Security and Rights in SAP BusinessObjects Business Intelligence 4.1

An Overview of SAP BW Powered by HANA. Al Weedman

Set Up Hortonworks Hadoop with SQL Anywhere

Cloud Single Sign-On and On-Premise Identity Federation with SAP NetWeaver Cloud White Paper

SAP Customer Relationship Management. Delivering Superior Customer Value in Communications Firms Enabling Optimal Offer Creation

Configuring Java IDoc Adapter (IDoc_AAE) in Process Integration. : SAP Labs India Pvt.Ltd

Integration of SAP Netweaver User Management with LDAP

SECURITY TRENDS & VULNERABILITIES REVIEW 2015

Within Budget and on Time

SAP BusinessObjects Business Intelligence (BOBI) 4.1

BUSINESS STRUCTURE: FUNCTIONS AND PROCESSES

John D. Bonam Disaster Recovery Architecture Session # 2841

SAP Business Planning & Consolidation Discover its enhanced capabilities

SAP HANA Live & SAP BW Data Integration A Case Study

If I want a perfect cyberweapon, I'll target ERP

Bank Hacking Live! Ofer Maor CTO, Hacktics Ltd. ATC-4, 12 Jun 2006, 4:30PM

SAP Business One OnDemand. SAP Business One OnDemand Solution Overview

SAP Thought Leadership Business Intelligence IMPLEMENTING BUSINESS INTELLIGENCE STANDARDS SAVE MONEY AND IMPROVE BUSINESS INSIGHT

Extending The Value of SAP with the SAP BusinessObjects Business Intelligence Platform Product Integration Roadmap

Implementing an Enterprise Information Management Strategy An Approach That Mitigates Risk and Drives Down Costs

SAP Executive Insight. Best Practices of the Best-Run Sales Organizations Sales Opportunity Blueprinting

SAP NETWEAVER ARCHITECTURE CONCEPTS, PART 1

Compliant, Business-Driven Identity Management using. SAP NetWeaver Identity Management and SBOP Access Control. February 2010

BW Workspaces Use Cases

Made to Fit Your Needs. SAP Solution Overview SAP Solutions for Small Businesses and Midsize Companies

SAP Business Intelligence Adoption V7.41:Software and Delivery Requirements. SAP Business Intelligence Adoption August 2015 English

SAP HANA SPS 09 - What s New? HANA IM Services: SDI and SDQ

Enhance Performance Management Reporting

Run SAP like a Factory

SAP HANA Live for SAP Business Suite. David Richert Presales Expert BI & EIM May 29, 2013

Real-Time Reconciliation of Invoice and Goods Receipts powered by SAP HANA. Stefan Karl, Finance Solutions, SAP ASUG Presentation, May 2013

Process Archiving using NetWeaver Business Process Management

SAP White Paper Enterprise Information Management

SAP BusinessObjects (BI) 4.1 on SAP HANA Piepaolo Vezzosi, SAP Product Strategy. Orange County Convention Center Orlando, Florida June 3-5, 2014

Transcription:

SAP Business Objects Attacks: Espionage and Poisoning of BI Platforms Title goes here 21/11/2014 Juan Perez-Etchegoyen jppereze@onapsis.com @jp_pereze 1

Disclaimer This presentation contains references to the products of SAP AG. SAP, R/3, xapps, xapp, SAP NetWeaver, Duet, PartnerEdge, ByDesign, SAP Business ByDesign, and other SAP products and services mentioned herein are trademarks or registered trademarks of SAP AG in Germany and in several other countries all over the world. Business Objects and the Business Objects logo, BusinessObjects, Crystal Reports, Crystal Decisions, Web Intelligence, Xcelsius and other Business Objects products and services mentioned herein are trademarks or registered trademarks of Business Objects in the United States and/or other countries. SAP AG is neither the author nor the publisher of this publication and is not responsible for its content, and SAP Group shall not be liable for errors or omissions with respect to the materials.

Company Overview Transforming how organizations protect the applications that manage their business-critical processes and information. Founded: 2009 Headquarters: Boston, MA with Offices in South America and EMEA Status: Privately held. Backed by leading investors Headcount: 60+ which includes 30+ in R&D Research: 130+ SAP security advisories and presentations published

Who am I? Juan Perez-Etchegoyen (JP) CTO @ Onapsis Background on Penetration Testing and vulnerabilities research Reported vulnerabilities in different SAP and Oracle Products Author/Contributor on diverse posts and publications Speaker and Trainer at Information Security Conferences http://www.onapsis.com

Why SAP Security When performing security assessments I found that 95% of SAP systems are exposed to vulnerabilities. That is why I started Onapsis Mariano Nunez, CEO of Onapsis

Headlines

Agenda SAP BusinessObjects Landscape The attacker lifecycle Abusing the Business Intelligence Process Conclusions

SAP BusinessObjects Landscape

What is SAP? Largest provider of business management solutions in the world. More than 250.000 customers around the globe. More than 70.000 employees. Used by Global Fortune-1000 companies, governmental organizations and defense agencies to run their every-day business processes. Such as Revenue / Production / Expenditure business cycles. FINANCIAL PLANNING SALES PRODUCTION TREASURY INVOICING LOGISTICS PROCUREMENT PAYROLL BILLING

SAP BusinessObjects Purchased by SAP in 2007 Business Analysis and Intelligence is the Core Functionality Produces Reports, Dashboards and KPI consumed by decision makers Simplifies analysis of data for users Usually pulling information from products such as ERP or CRM

Impact of a breach to an SAP system While for traditional SAP systems (ERP,CRM,SCM ) it is easier to understand the impact of a security breach... ESPIONAGE: Obtain customers/vendors/human resources data, financial planning information, balances, profits, sales information, manufacturing recipes, etc. SABOTAGE: Paralyze the operation of the organization by shutting down the SAP system, disrupting interfaces with other systems and deleting critical information, etc. FRAUD: Modify financial information, tamper sales and purchase orders, create new vendors, modify vendor bank account numbers, etc.

Impact of a breach to an SAP system In a BusinessObjects implementation it is more difficult to understand the impact of a security breach... FINANCIAL STATEMENT: Incorrect reporting to authorities such as SEC. Access the information in advance. BUDGETING AND STAFFING: Incorrect allocating of resources for the achievement of targets. SALES FORECAST: Critical to determine the budget and to understand how much the company will grow, quantity of products to be produced, purchasing requirements LIQUIDITY PLANNING: Affect the understanding of the available cash that the company will have during a period of time.

Business Intelligence

BO/BI/BW BW is an analytical, reporting and data warehousing product Structured by layers. ETL (Extract, Transform, Load) is probably the most important layer The process of extracting data from other SAP Systems is usually performed by RFC Function Calls. SAP BusinessObjects are usually connected to SAP BW

Architecture of SAP BO

Architecture of SAP BO

VIP Services Central Management Server File Repository Server Report Templates Resulting Reports Server Intelligence Agent Client Endpoints Web Applications: CMC Web Services

Communication From the Client browser tier to the Application tier, SOAP and HTTP are the most common methods of communication (REST is also available) Most of the Inter Process communication is done using CORBA on the BO Service Bus

Communication - CORBA Standard defined by OMG ( Similar to JAVA RMI) Uses IIOP Network Protocol Uses IDL to define interfaces exposed Source: Wikipedia Designed to facilitate the communication of systems that are deployed on diverse platforms.

Client-to-Server Communication. CORBA Interoperable Object Reference (IOR) Reference to a remote object Provided by the server, consumed by the client to communicate using remote object Example Components IDL:Hello/HelloWorld Host: www.remotecorba.com Port: 4678

BO Communication. CORBA Each BO server has a number of services available via CORBA A client needs to know the IOR of the remote service to initiate communication They also need to know (or reverse engineer) the IDL to communicate meaningfully

BO CORBA Example Client to CMS Client aps CMS Client IOR:010000003500. CMS Parse IOR to obtain IP/Port, Object Key, Client {object} CMS

BO and the Attacker Lifecycle

Quick Note on attackers Many Different Types of attackers Internal/External Advanced/Script kiddies Just for fun/criminal organizations Identifying the threat actor is an obvious key to defense Define monitoring processes Define configuration and security standards

Reconnaissance (Default Ports)

What would an attacker use to target a BO implementation? CMS IP CMS Static Port CMS IOR SRV s IORs

Reconnaissance In default state, 15 dynamic ports Example Use Case One service needs to know the IP:PORT of another service. How does it get this information? Asks the CMS via CORBA

Demo Attacker discovering service ports

Note on Defense As discussed in the Administrators guide, limiting network access to every BusinessObjects component is the best method to protect against pulling information from these services.

Account types Enterprise SAP LDAP WindowsAD

Default Accounts (Reconnaissance)

Note on Defense It is critically important to apply the most up to date security notes. Furthermore, disabling unused web applications and services limits the attack surface.

Major Version Info (Reconnaissance) What Web Interfaces are available? Web Services also has valuable information

A warning about MitM Communication is Unencrypted by default An Attacker can hijack a Session via HTTP or CORBA

Poisoning and Intercepting Business Intelligence

Business-oriented Attack Vectors We are discussing an attacker that wishes to access or poison the Business Intelligence Process Intercepting vs. Poisoning Information disclosure Any information in the data sources Generated Reports Information Tampering Switching data source system Changes on the business data Changes on the generated reports

Information Disclosure BO processes and groups information from many systems (ERP, SCM, CRM, HR, etc). By compromising BO/BW/BI the attacker will have almost all of the company critical information in a central repository. Access to Business Reports Access to Financial Statements ERP CRM BI SCM HR

Information Tampering Change data source Point to a different SAP system (ERP,BW ) Changing Infoproviders (Infoset, SAP Queries ) Modify BO contents Reports Dashboards KPI

Demo Attacker connecting to Source System

Impacting BO BI Client Side Commonly an attacker will focus on a client with access Obvious ways to access data Check the FS Browser cookies How else? Network Sniffing! Active Traffic is best But, the Client will auto ping the Server on a set schedule (SESSION_ID is given in the ping)

Demo Sniffing traffic to hijack sessions

Impacting BO BI Server Side Power Shell Made available in the Client or Server BusinessObjects installation SDK Like functionality Reporting Access InfoQuery Session Handling Available to BO clients and to attackers too!

Impacting BO BI Server Side File Repository Server Input Output What is a report to BO? File on the Filesystem Entry in the InfoStore Not all files will stay overwritten

Demo Changes on existing business reports

Conclusions Read the Admin Guide! Many of these attacks can be prevented or detected Keep the systems updated! Enable Auditing Periodically scan/monitor the systems Secure the system and the critical data

Title goes here Questions? Thanks to Will Vandevanter and the ORL 46