Andreas Wiegenstein Dr. Markus Schumacher



Similar documents
Detecting Data Leaks in SAP -

Inception of the SAP Platform's Brain Attacks on SAP Solution Manager

Dell One Identity Cloud Access Manager How to Configure for SSO to SAP NetWeaver using SAML 2.0

SEC100 Secure Authentication and Data Transfer with SAP Single Sign-On. Public

How to Implement the X.509 Certificate Based Single Sign-On Solution with SAP Netweaver Single Sign-On

zur Erstellung von Präsentationen

Ensuring the Security and Quality of Custom SAP Applications

SAP Project Portfolio Monitoring Rapid- Deployment Solution: Software Requirements

Security Guide SAP GUI for Windows

ATTACKS TO SAP WEB APPLICATIONS

BC481 SAP Interactive Forms by Adobe

Unbreakable ABAP? Vulnerabilities in custom ABAP Code Markus Schumacher, Co-Founder Virtual Forge GmbH

4.0. Offline Folder Wizard. User Guide

An Oracle White Paper June Security and the Oracle Database Cloud Service

Auditing the Security of an SAP HANA Implementation

SAP NetWeaver Identity Management Identity Services Configuration Guide

Monitoring and Management of Landscapes with SAP NetWeaver Administrator. Dieter Krieger, SAP AG

PLSAP CONNECTOR FOR TALEND USER MANUAL

Mitigating Risks and Monitoring Activity for Database Security

Members of the UK cyber security forum. Soteria Health Check. A Cyber Security Health Check for SAP systems

Oracle Whitepaper April Security and the Oracle Database Cloud Service

How To Manage Web Content Management System (Wcm)

Object Level Authentication

CREATING A PURCHASE ORDER STORE RECORD WEB SERVICE

3 rd party Service Desk interface

Active Directory Change Notifier Quick Start Guide

Using SAP Logon Tickets for Single Sign on to Microsoft based web applications

Top 10 most interesting SAP vulnerabilities and attacks Alexander Polyakov

RUN BETTER Become a Best-Run Business with Remote Support Platform for SAP Business One

Security Think beyond! Patrick Hildenbrand, SAP HANA Platform Extensions June 17, 2014

Dell Statistica Statistica Enterprise Installation Instructions

How to configure BusinessObjects Enterprise with Citrix Presentation Server 4.0

ios Deployment Simplified FileMaker How To Guide

How-To Guide SAP NetWeaver Document Version: How To Guide - Configure SSL in ABAP System

Integrate Third Party Collaboration Tools in the SAP NetWeaver Portal. SAP NetWeaver Product Management

Dell NetVault Backup Plug-in for Advanced Encryption 2.2. User s Guide

SAP Security Recommendations December Secure Software Development at SAP Embedding Security in the Product Innovation Lifecycle Version 1.

ITM204 Post-Copy Automation for SAP NetWeaver Business Warehouse System Landscapes. October 2013

Hardening of SAP HTTP- and Webservices

Dell Statistica Document Management System (SDMS) Installation Instructions

SAP BusinessObjects Business Intelligence 4 Innovation and Implementation

IGEL Universal Management. Installation Guide

Managing for the Long Term: Keys to Securing, Troubleshooting and Monitoring a Private Cloud

E-Recruiting Job Board Integration using XI

How To Secure An Rsa Authentication Agent

NetVault LiteSpeed for SQL Server version Integration with TSM

StarWind iscsi SAN Software: Installing StarWind on Windows Server 2008 R2 Server Core

Gateway Apps - Security Summary SECURITY SUMMARY

Dell One Identity Manager 7.0. Help Desk Module Administration Guide

Developing Applications for Integration between PI and SAP ERP in Different Network Domains or Landscapes

SAP NetWeaver Application Server Add-On for Code Vulnerability Analysis

Streamlining Web and Security

Master Data Governance Security Guide

How To Manage Work Mode On An It Calendar On An Apa System

Subversion Server for Windows

Defender 5.7. Remote Access User Guide

Hardening of SAP HTTP- and Webservices

Organized, Hybridized Network Monitoring

CHANNEL PARTNER (VAR) Technical Support Network. SAP Global Service & Support March 2011

An Oracle White Paper July Introducing the Oracle Home User in Oracle Database 12c for Microsoft Windows

CYBER-ATTACKS & SAP SYSTEMS Is our business-critical infrastructure exposed?

Dell Statistica. Statistica Document Management System (SDMS) Requirements

Version 9. Active Directory Integration in Progeny 9

Installation Guide: Agentry Device Clients SAP Mobile Platform 2.3

Update on the SAP GUI Family. Q3/2014 Public

White Paper Secure Reverse Proxy Server and Web Application Firewall

How to Configure Access Control for Exchange using PowerShell Cmdlets A Step-by-Step guide

SAP Fiori Infrastructure rapid-deployment solution: Software and Delivery Requirements

Getting Started with the License Administration Workbench 2.0 (LAW 2.0)

The SAProuter An Internet Window to your SAP Platform (and beyond)

Implementing Outlook Integration for SAP Business One

Installing the BlackBerry Enterprise Server Management Software on an administrator or remote computer

Compliance & SAP Security. Secure SAP applications based on state-of-the-art user & system concepts. Driving value with IT

Dell One Identity Cloud Access Manager How to Configure Microsoft Office 365

Web Portal Installation Guide 5.0

Backup & Restore with SAP BPC (MS SQL 2005)

Utilities for downloading and uploading OO ABAP classes in XML format

Set Up Hortonworks Hadoop with SQL Anywhere

BC450 ABAP Performance: Analysis and Optimization

Enterprise Reporter Report Library

Dell One Identity Cloud Access Manager How to Develop OpenID Connect Apps

How Configuration Management Tools Address the Challenges of Configuration Management

S E C U R I T Y A S S E S S M E N T : B o m g a r B o x T M. Bomgar. Product Penetration Test. September 2010

SAP NetWeaver Application Server Add-On for Code Vulnerability Analysis. Patrick Hildenbrand, Product Management Security, SAP AG September 2014

Installing the BlackBerry Enterprise Server Management console with a remote database

Polar Help Desk Installation Guide

The Essentials Series: Enterprise Identity and Access Management. Authentication. sponsored by. by Richard Siddaway

User Experience in Custom Apps

SAP Netweaver Application Server and Netweaver Portal Security

SAP Business One mobile app for Android Version 1.0.x November 2013

SAP Service Tools for Performance Analysis

Enabling Full-Text Search for Business Objects in mysap ERP

Configuring Distribution List in Compliant User Provisioning

1. Introduction. 2. Web Application. 3. Components. 4. Common Vulnerabilities. 5. Improving security in Web applications

Budget Control by Cost Center

Lepide Active Directory Self Service. Installation Guide. Lepide Active Directory Self Service Tool. Lepide Software Private Limited Page 1

Transcription:

Andreas Wiegenstein Dr. Markus Schumacher PPT SAP Masterfolie GUI Hacking (V1.0) zur Troopers Erstellung Conference von 2011, Heidelberg Präsentationen

Who am I Andreas PPT Masterfolie Wiegenstein CTO and founder of Virtual Forge, responsible for R&D SAP Security Researcher, active since 2003 Speaker at SAP TechEd 2004, 2005, 2006, DSAG 2009, BlackHat 2011 Co-Author of "Secure ABAP Programming" (SAP Press) Virtual Forge GmbH SAP security product company based in Heidelberg, Germany Focus on (ABAP) application security services ABAP Security Scanner ABAP Security Guidelines ABAP Security Trainings SAP Security Consulting

Belief: "Our SAP system is secure." PPT Roles Masterfolie & Authorizations Segregation of Duties Secure Configuration & System / Service Hardening Encryption Secure Network Infrastructure Password Policies Patch Management Identity Management Single Sign-on

Reality-Check PPT Masterfolie

1. PPT ABAP, Masterfolie the SAP GUI and everything

Advanced Business Application Programming PPT Proprietary Masterfolie language, exact specification not (freely) available zur Platform-independent Erstellung von code Präsentationen Client separation built-in Integrated auditing capabilities System-to-System calls via SAP Remote Function Call (RFC) Client-Server communication via SAP GUI (DIAG protocol) Various programming paradigms: Programs & Forms, Reports, Function Modules, Dynpros Classes & Methods, Business Server Pages, Web Dynpro ABAP Integrated platform-independent SQL Standard: Open SQL Built-in authentication, roles and (explicit) authorization model Thousands of well-known standard programs and database tables 150+ Million Lines of Code in an ECC6.0 System

SAP GUI PPT Proprietary Masterfolie fat client, provided and maintained by SAP zur Available Erstellung as Windows von executable Präsentationen and Java application Client-Server Communication via DIAG protocol DIAG can be encrypted with SNC, but is only compressed by default Renders ABAP Dynpros and is the default SAP user interface Provides methods to interchange files with the SAP application server Execution of screen-events can be scripted

2. PPT SAP Masterfolie GUI Attacks originating from the Server

ABAP Functions that access the SAP GUI client PPT Function Masterfolie Module WS_EXECUTE Function Module GUI_UPLOAD Uploads a file from the Client to the Server Function Module GUI_DOWNLOAD Downloads a file from the Server to the Client Class CL_GUI_FRONTEND_SERVICES Provides various other functions Directory listing, access to clipboard, etc Underlying ABAP Commands CALL METHOD OF CALL cfunc Executes an operating system command on the client

Attack Vectors PPT Masterfolie DEMO

Mitigation(s) PPT Install Masterfolie SAP GUI 7.20 Restrict access to client-side ressources New security center in SAP GUI for Windows 7.20 (https://service.sap.com/sap/support/notes/1483525 ) More on SAP GUI Security "Secure Configuration SAP Netweaver Application Server ABAP" https://service.sap.com/~sapidb/011000358700000968282010e.pdf

3. PPT SAP Masterfolie GUI Attacks originating from the Client

Client-side Manipulations PPT Forceful Masterfolie Browsing in SAP GUI! zur Erstellung Manipulate disabled von fields Präsentationen and buttons Cross-Site Scripting in SAP GUI applications!!! Not nice, but rare SAP GUI scripting Scripting of SAP GUI events

Attack Vectors PPT Masterfolie DEMO

Mitigation(s) PPT Masterfolie Do not transport important data by client-roundtrips Make sure you use HTMLViewer Control (CL_DD_DOCUMENT) securely Disable SAP GUI scripting See "SAP GUI Scripting Security Guide" http://www.sdn.sap.com/irj/scn/index?rid=/library/uuid/3099a575-9cf4-2a10-9492-9838706b9262

4. PPT SAP Masterfolie GUI Attacks originating from the Internet

Attacks from the Internet PPT Masterfolie Cross-Application Request Forgery with SAP Shortcuts Allows malicious Web sites to fire SAP GUI events

Attack Vector PPT Masterfolie DEMO

Mitigation(s) PPT Read Masterfolie SAP Security Notes 1397000 & 1526048 (https://service.sap.com/sap/support/notes/1397000) (https://service.sap.com/sap/support/notes/1526048)

SAP / ABAP Security Information PPT Organizations Masterfolie BIZEC Business Security Initiative http://www.bizec.org Literature "Secure ABAP-Programming" (German only) SAP Press 2009 If you find new zero days secure@sap.com

Questions? PPT Masterfolie http://www.virtualforge.com Andreas.Wiegenstein@virtualforge.com VirtualForge GmbH Speyerer Straße 6 69115 Heidelberg Deutschland Phone: + 49 (0) 6221 86 89 0-0 Fax: + 49 (0) 6221 86 89 0-101

Disclaimer PPT Masterfolie SAP, R/3, ABAP, SAP GUI, SAP NetWeaver and other SAP products and services mentioned herein as well as their respective logos are trademarks or registered trademarks of SAP AG in Germany and other countries. All other product and service names mentioned are the trademarks of their respective companies. Data contained in this document serves informational purposes only. The author assumes no responsibility for errors or omissions in this document. The author does not warrant the accuracy or completeness of the information, text, graphics, links, or other items contained within this material. This document is provided without a warranty of any kind, either express or implied, including but not limited to the implied warranties of merchantability, fitness for a particular purpose, or non-infringement. The author shall have no liability for damages of any kind including without limitation direct, special, indirect, or consequential damages that may result from the use of this document. No part of this document may be reproduced without the prior written permission of Virtual Forge GmbH. 2011 Virtual Forge GmbH.