SlideShare a Scribd company logo
1 of 80
Download to read offline
Invest	
  in	
  security	
  
to	
  secure	
  investments	
  
All	
  your	
  SAP	
  Passwords	
  
belong	
  to	
  us.	
  
	
  
Dmitry	
  Chastuchin	
  
Director,	
  Security	
  Consul;ng	
  ERPScan.	
  	
  
	
  
About	
  ERPScan	
  
•  The	
   only	
   360-­‐degree	
   SAP	
   Security	
   solu;on	
   -­‐	
   ERPScan	
   Security	
  
Monitoring	
  Suite	
  for	
  SAP	
  
•  Leader	
  by	
  the	
  number	
  of	
  acknowledgements	
  from	
  SAP	
  (	
  150+	
  )	
  
•  60+	
  presenta=ons	
  key	
  security	
  conferences	
  worldwide	
  
•  25	
  Awards	
  and	
  nomina=ons	
  
•  Research	
  team	
  -­‐	
  20	
  experts	
  with	
  experience	
  in	
  	
  different	
  areas	
  
of	
  security	
  
•  Headquarters	
  in	
  Palo	
  Alto	
  (US)	
  and	
  Amsterdam	
  (EU)	
  
	
  
	
  
2	
  
SAP	
  
•  The	
  most	
  popular	
  business	
  applica;on	
  
•  More	
  than	
  250000	
  customers	
  worldwide	
  	
  
•  More	
  than	
  83	
  %	
  of	
  Forbes	
  500	
  run	
  SAP	
  
3	
  
SAP	
  security	
  
Espionage	
  
•  Stealing	
  financial	
  informa;on	
  
•  Stealing	
  corporate	
  secrets	
  
•  Stealing	
  supplier	
  and	
  customer	
  lists	
  
•  Stealing	
  HR	
  data	
  
Fraud	
  
•  False	
  transac;ons	
  
•  Modifica;on	
  of	
  master	
  data	
  
Sabotage	
  
•  Denial	
  of	
  service	
  
•  Modifica;on	
  of	
  financial	
  reports	
  
•  Access	
  to	
  technology	
  network	
  (SCADA)	
  by	
  trust	
  rela;ons	
  
4	
  
Is	
  it	
  remotely	
  exploitable?	
  
	
  	
  
5000+	
  	
  non-­‐web	
  SAP	
  services	
  exposed	
  in	
  the	
  world	
  
	
  including	
  Dispatcher,	
  Message	
  server,	
  SapHostControl,	
  etc.	
  	
  
5	
  
Is	
  it	
  remotely	
  exploitable?	
  
	
  	
  
0
1
2
3
4
5
6
7
8
9
SAP Dispatcher SAP MMC SAP Message Server SAP HostControl SAP ITS Agate SAP Message Server
httpd
6	
  
SAP	
  MMC	
  –	
  overview	
  
•  MMC	
  is	
  installed	
  by	
  default	
  on	
  port	
  5<ID>13	
  
•  Used	
  for	
  remote	
  management	
  of	
  SAP	
  servers	
  
•  Commands	
  executed	
  via	
  SOAP	
  interface	
  
•  By	
  default,	
  SSL	
  is	
  not	
  implemented	
  
•  Administra;ve	
  password	
  transmied	
  using	
  basic	
  auth	
  (Base64)	
  
•  By	
  sniffing	
  this	
  password,	
  we	
  can	
  get	
  full	
  control	
  over	
  the	
  server	
  
	
  
	
  
7	
  
SAP	
  MMC	
  –	
  aSacks	
  
•  Many	
  aacks	
  can	
  be	
  implemented	
  without	
  authen;ca;on	
  
•  Aacks	
  can	
  be	
  executed	
  by	
  sending	
  SOAP	
  requests	
  
•  Mostly,	
  it	
  is	
  informa;on	
  disclosure	
  and	
  denial	
  of	
  service	
  
•  Also,	
  OS	
  command	
  execu;on	
  	
  
8	
  
Advanced	
  MMC	
  aSacks	
  
<?xml version="1.0"?>
<SOAP-ENV:Envelope xmlns:SOAP-ENV="http://schemas.xmlsoap.org/soap/envelope/"
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:xs="http://
www.w3.org/2001/XMLSchema">
<SOAP-ENV:Header>
<sapsess:Session xmlns:sapsess="http://www.sap.com/webas/630/soap/features/
session/">
<enableSession>true</enableSession>
</sapsess:Session>
</SOAP-ENV:Header>
<SOAP-ENV:Body>
<ns1:ReadLogFile xmlns:ns1="urn:SAPControl">
<filename>j2ee/cluster/server0/log/system/userinterface.log</filename>
<filter/>
<language/>
<maxentries>%COUNT%</maxentries>
<statecookie>EOF</statecookie>
</ns1:ReadLogFile>
</SOAP-ENV:Body>
</SOAP-ENV:Envelope>
9	
  
PWN	
  
If	
  an	
  a&acker	
  can	
  read	
  a	
  file	
  from	
  server	
  OS,	
  he	
  can	
  get	
  clear	
  text	
  
passwords	
  of	
  SAP	
  users	
  and,	
  as	
  a	
  result,	
  compromise	
  the	
  SAP	
  
system	
  
10	
  
11	
  
Default	
  passwords	
  
Passwords	
  on	
  client	
  side	
  
User	
  name	
   Password	
  
SAP*	
   06071992	
  
PASS	
  
DDIC	
   19920706	
  
TMSADM	
   PASSWORD	
  
$1Pawd2&	
  
EARLYWATCH	
   SUPPORT	
  
SAPCPIC	
   ADMIN	
  
12	
  
13	
  
Passwords	
  on	
  client	
  side	
  
Passwords	
  on	
  client	
  side	
  
•  Aack	
  via	
  Ac;veX	
  
‒  A	
  lot	
  of	
  issues	
  with	
  RCE	
  inside	
  (1519966,	
  1327004,	
  1092631,	
  …)	
  
•  Aack	
  via	
  client	
  bugs	
  
‒  Buffer	
  overflow	
  in	
  saplogon.exe	
  (1504547)	
  
	
  
What	
  aler	
  that?	
  
	
  
SapLogon	
  shortcuts!	
  
	
  
Olen,	
  lazy	
  users	
  store	
  password	
  for	
  SAP	
  account	
  in	
  shortcuts	
  
	
  
14	
  
Passwords	
  on	
  client	
  side	
  
[System]
Name=DM0
Description=Test Sap Server
Client=800
[User]
Name=SAP*
Language=EN
Password=PW_48B7231FD1FE390C
[Function]
Title=myShortcut
Command=se16
[Configuration]
WorkDir=C:Documents and SettingsAdministratorMy DocumentsSAPSAP GUI
[Options]
Reuse=1
	
  
This	
  is	
  how	
  a	
  typical	
  shortcut	
  looks	
  like…	
  
	
  
	
  
File: <name>.sap
15	
  
Passwords	
  on	
  client	
  side	
  
[Label]
Key1=myShortcut
[Command]
Key1=-
desc="Test Sap Server"
-sid="DM0"
-clt="800"
-u="SAP*"
-l="EN"
-tit="myShortcut"
-cmd="se16"
-wd="C:Documents and SettingsAdministratorMy DocumentsSAPSAP GUI"
-ok="/nse16"
-pwenc="PW_48B7231FD1FE390C"
	
  
	
  
	
  
…or	
  like	
  that	
   	
  
	
  
	
  
	
  
	
  
	
  
	
  
File: sapshortcut.ini
16	
  
Passwords	
  on	
  client	
  side	
  
pwenc="PW_48B7231FD1FE390C"
PW_48B7231FD1FE390C
48B7231FD1FE390C
	
  
I	
  used	
  this	
  password:	
  06071992	
  	
  
Looks	
  like	
  XOR	
  encryp;on	
  
	
  
17	
  
Passwords	
  on	
  client	
  side	
  
•  Aler	
  a	
  few	
  experiments,	
  we	
  found	
  out:	
  
–  Yes,	
  this	
  is	
  XOR	
  	
  
–  Yes,	
  the	
  key	
  is	
  sta;c	
  for	
  all	
  SAPLogon	
  
	
  
•  The	
  key	
  is:	
  	
  
788113…dc49b0
	
  
	
  
	
  
	
  
18	
  
Passwords	
  on	
  client	
  side	
  
•  …and	
  the	
  PY	
  code	
  to	
  decrypt	
  
	
  
	
  
key="788…"
def sxor(s1,s2):
return ''.join(chr(ord(a) ^ ord(b)) for a,b in
zip(s1,s2))
enc_pass="PW_48B7231FD1FE390C"
dec_pass=sxor(enc_pass[3:].decode("hex"),key.decode("hex"))
print "Decoded password is: "+dec_pass
	
  
19	
  
Preven=on	
  
•  Don’t	
  use	
  SAPGUI	
  6.4	
  (there	
  are	
  no	
  patches	
  for	
  some	
  
vulns)	
  
•  Patch	
  SAPGUI	
  with	
  the	
  latest	
  SP	
  
•  Don’t	
  store	
  password	
  in	
  shortcuts	
  	
  
•  (HKCUSolwareSAPSAPShortcutSecurity	
  
EnablePassword=0)	
  
•  Make	
  sure	
  that	
  you	
  do	
  not	
  ac;vate	
  the	
  storage	
  of	
  
passwords	
  in	
  SAP	
  shortcuts	
  
•  Authen;ca;on	
  security	
  for	
  SAP	
  shortcuts:	
  
hp://help.sap.com/SAPHELP_NWPI71/helpdata/en/4d/dc9db9bc0e02cfe10000000a42189b/
content.htm	
  
	
  
20	
  
21	
  
Passwords	
  from	
  USR02,	
  USH02,	
  USRPWDHISTORY	
  
USR02	
  password	
  hash	
  
•  Well	
  known	
  password	
  area	
  
•  Hash	
  algorithm:	
  
–  CODVN	
  A	
  
–  CODVN	
  B	
  (MD5-­‐based)	
  
–  CODVN	
  D	
  (MD5-­‐based)	
  
–  CODVN	
  E	
  (MD5-­‐based)	
  
–  CODVN	
  F	
  (SHA1-­‐based)	
  
–  CODVN	
  G	
  (Code	
  versions	
  B	
  &	
  F)	
  
–  CODVN	
  H	
  (SHA-­‐1-­‐based)	
  
–  CODVN	
  I	
  (Code	
  versions	
  B,	
  F	
  &	
  H)	
  
•  Just	
  use	
  John	
  the	
  Ripper	
  
22	
  
Preven=on	
  
•  Use	
  the	
  latest	
  algorithm	
  
•  SAP	
  Note	
  2467:	
  Password	
  rules	
  and	
  preven;ng	
  incorrect	
  logons	
  
•  SAP	
  Note	
  721119:	
  Logon	
  with	
  (delivered)	
  default	
  user	
  fails	
  
•  SAP	
  Note	
  735356:	
  Special	
  character	
  in	
  passwords;	
  reac;va;on	
  not	
  possible	
  
•  SAP	
  Note	
  862989:	
  New	
  password	
  rules	
  as	
  of	
  SAP	
  NetWeaver	
  2004s	
  
•  SAP	
  Note	
  874738:	
  New	
  password	
  hash	
  calcula;on	
  procedure	
  (code	
  version	
  E)	
  
•  SAP	
  Note	
  991968:	
  Value	
  list	
  for	
  login/password_hash_algorithm	
  
•  SAP	
  Note	
  1023437:	
  Downwardly	
  incompa;ble	
  passwords	
  since	
  NW2004s	
  
•  SAP	
  Note	
  1237762:	
  Protec;on	
  against	
  password	
  hash	
  aacks	
  
•  SAP	
  Note	
  1300104:	
  CUA	
  –	
  New	
  password	
  hash	
  procedures	
  -­‐	
  Background	
  informa;on	
  
•  SAP	
  Note	
  1458262:	
  Recommended	
  se|ngs	
  for	
  password	
  hash	
  algorithms	
  
•  SAP	
  Note	
  1484692:	
  Protect	
  read	
  access	
  to	
  password	
  hash	
  value	
  tables	
  
•  SAP	
  Note	
  1488159:	
  SUIM	
  –	
  RSUSR003	
  –	
  Incorrect	
  results	
  for	
  CODVN	
  =	
  F	
  
23	
  
Passwords	
  from	
  RFC	
  request	
  
24	
  
Passwords	
  from	
  RFC	
  request	
  
•  If	
  an	
  aacker	
  catches	
  an	
  RFC	
  request	
  with	
  logon	
  data,	
  he	
  will	
  
be:	
  
–  Happy	
  because	
  he	
  got	
  the	
  login	
  and	
  password	
  
–  Upset	
  because	
  the	
  password	
  is	
  encrypted	
  
–  Happy	
  because	
  the	
  encryp;on	
  is	
  just	
  a	
  XOR	
  (lol)	
  
–  Happy	
  because	
  the	
  key	
  is	
  sta;c	
  
	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  Key: 313ec…a4021	
  
–  Very	
  happy	
  because	
  he	
  got	
  the	
  clear	
  text	
  password	
  
	
  
25	
  
Passwords	
  from	
  RFC	
  request	
  
26	
  
Passwords	
  from	
  RFC	
  request	
  
•  …and	
  the	
  PY	
  code	
  to	
  decrypt	
  
	
  
	
  
key="313e…"
def sxor(s1,s2):
return ''.join(chr(ord(a) ^ ord(b)) for a,b in
zip(s1,s2))
enc_pass="0108F357D03F770D"
dec_pass=sxor(enc_pass.decode("hex"),key.decode("hex"))
print "Decoded password is: "+dec_pass
27	
  
Preven=on	
  
•  Secure	
  RFC	
  connec;on	
  using	
  	
  SNC	
  
•  SAP	
  Security	
  Note	
  1724516	
  
•  RFC	
  and	
  SNC:	
  
hp://help.sap.com/saphelp_nw70ehp2/helpdata/en/72/
e52c4057cb185de10000000a1550b0/content.htm	
  
	
  
28	
  
29	
  
SAP	
  Visual	
  Admin	
  password	
  
SAP	
  VisualAdmin	
  
30	
  
•  SAP	
  Visual	
  Admin	
  –	
  a	
  remote	
  tool	
  for	
  controlling	
  J2EE	
  Engine	
  
•  Uses	
  the	
  P4	
  protocol	
  –	
  SAP’s	
  proprietary	
  
•  By	
  default,	
  all	
  data	
  transmied	
  in	
  cleartext	
  
•  P4	
  can	
  be	
  configured	
  to	
  use	
  SSL	
  to	
  prevent	
  MitM	
  
•  Passwords	
  are	
  transmied	
  by	
  some	
  sort	
  of	
  encryp;on	
  	
  
•  In	
  reality,	
  it	
  is	
  some	
  sort	
  of	
  Base64	
  transforma;on	
  with	
  a	
  known	
  
key	
  
	
  
	
  
	
  	
  
SAP	
  VisualAdmin	
  data	
  
31	
  
Insecure	
  password	
  encryp=on	
  in	
  P4	
  
32	
  
/* 87 */ char mask = 43690; //aaaa hex
/* 88 */ char check = 21845; //5555 hex
/* 89 */ char[] result = new char[data.length + 1];
/* */
/* 91 */ for (int i = 0; i < data.length; ++i) {
/* 92 */ mask = (char)(mask ^ data[i]);
/* 93 */ result[i] = mask;
/* */ }
/* 95 */ result[data.length] = (char)(mask ^ check);
/* */
/* 97 */ return result;
33	
  
DEMO	
  
SAP	
  Visual	
  Admin	
  password	
  sniffing	
  
Preven=on	
  
•  Secure	
  P4	
  connec;on	
  using	
  SSL	
  
•  SAP	
  Security	
  Note	
  1724516	
  
•  Using	
  P4	
  protocol	
  over	
  a	
  secure	
  connec;on:	
  
hp://help.sap.com/saphelp_nw73ehp1/helpdata/en/
48/2d9ba88aef4bb9e10000000a42189b/content.htm	
  
34	
  
35	
  
SAP	
  JAVA	
  Security	
  Storage	
  
SecStore	
  
•  The	
  AS	
  Java	
  stores	
  security-­‐relevant	
  informa;on	
  encrypted	
  in	
  a	
  
file	
  in	
  the	
  file	
  system	
  
•  The	
  AS	
  Java	
  stores	
  the	
  following	
  security-­‐relevant	
  informa;on	
  
in	
  files	
  in	
  the	
  file	
  system:	
  
–  	
  Database	
  user	
  SAP<SID>DB	
  and	
  its	
  password	
  
–  	
  Database	
  connec;on	
  informa;on	
  
–  	
  Administrator	
  user	
  and	
  its	
  password	
  
	
  
•  Secure	
  storage	
  file	
  is	
  located	
  at	
  :	
  
usrsap<SID>SYSglobalsecuritydataSecStore.properties	
  	
  	
  
	
  
	
  
36	
  
SecStore	
  
$internal/version=Ni4zFF4wMSeaseforCCMxegAfx
admin/host/TTT=7KJuOPPs/+u+14jM7uy7cy7exrZuYvevkSrPxwueur2445yxgBS
admin/password/TTT=7KJuOPPs/+uv+14j56vDc7M7v7dytbGbkgqDp+QD04b0Fh
jdbc/pool/TTT=7KJuOPPs/+u5jM6s1cvvgQ1gzFvarxuUzEJTHTJI0VGegH
admin/port/TTT=7KJuOPPs/+u+1j4vD1cv6ZTvd336rzEd7267Rwr4ZUgRTQ
$internal/check=BJRrzfjeUA+bw4XCzdz16zX78ufbt
$internal/mode=encrypted
admin/user/TTT=7KJuOPPs/+u+14j6s14sTxXU3ONl3rL6N7yssV75eC6/5S3E
•  The	
  AS	
  Java	
  uses	
  the	
  SAP	
  Java	
  Cryptography	
  Toolkit	
  to	
  encrypt	
  
the	
  informa;on	
  in	
  the	
  secure	
  store	
  using	
  the	
  TripleDES	
  
algorithm.	
  The	
  encryp;on	
  is	
  performed	
  during	
  the	
  AS	
  Java	
  
installa;on	
  process
•  Let’s	
  look	
  deeper	
  
37	
  
SecStore	
  
•  Algorithm	
  is	
  TripleDES.	
  We	
  heed	
  a	
  key	
  for	
  decryp;on	
  
•  The	
  main	
  issue	
  is	
  that	
  the	
  key	
  file	
  is	
  located	
  in	
  the	
  same	
  
directory	
  as	
  the	
  encrypted	
  data:	
  
usrsap<SID>SYSglobalsecuritydataSecStore.key
	
  
	
  
	
  
•  The	
  key	
  consists	
  of	
  two	
  parts:	
  
– 	
  Version	
  informa;on	
  
– 	
  Encrypted	
  key	
  phrase	
  
38	
  
SecStore	
  
•  	
  Version	
  informa;on.	
  It	
  affects	
  the	
  TripleDES	
  key	
  
– 	
  	
  If	
  version	
  >=	
  7.00.000,	
  then	
  the	
  Triple	
  DES	
  key	
  =	
  key	
  phrase	
  +	
  <SID>	
  
•  	
  Encrypted	
  key	
  phrase	
  	
  
– 	
  By	
  default,	
  it	
  is	
  the	
  ini;al	
  password	
  which	
  the	
  administrator	
  sets	
  up	
  during	
  
SAP	
  system	
  installa;on.	
  Olen,	
  this	
  phase	
  equals	
  to	
  the	
  DB	
  password	
  or	
  an	
  
SAP	
  administrator	
  account	
  password	
  (SAP*,	
  DDIC,	
  J2EE_Admin,	
  etc.)	
  
– 	
  	
  For	
  encryp;ng	
  the	
  key	
  phrase,	
  XOR	
  algorithm	
  with	
  sta;c	
  key	
  is	
  used	
  
	
  
43,-74…,-41,-67 	
  
	
  
•  That’s	
  why,	
  if	
  an	
  aacker	
  only	
  got	
  the	
  SecStore.key	
  file,	
  they	
  can	
  
also	
  get	
  access	
  into	
  SAP,	
  because	
  they	
  have	
  the	
  ini;al	
  password	
  
39	
  
SecStore	
  
•  OK.	
  We	
  have	
  the	
  encrypted	
  password	
  (SecStore.properXes)	
  
•  We	
  have	
  the	
  decryp;on	
  key	
  (SecStore.key)	
  
•  We	
  can	
  get	
  all	
  sensi;ve	
  informa;on	
  from	
  Security	
  Storage	
  	
  
•  As	
  I	
  said,	
  data’s	
  encrypted	
  by	
  the	
  TripleDES	
  algorithm	
  
•  More	
  precisely,	
  the	
  encryp;on	
  uses	
  the	
  TripleDES	
  algorithm	
  in	
  
CBC	
  mode	
  using	
  a	
  secret	
  key	
  which	
  is	
  derived	
  from	
  a	
  password	
  
with	
  the	
  SHA	
  hash	
  algorithm	
  
– 	
  The	
  key	
  is	
  the	
  key	
  phrase	
  from	
  SecStore.key	
  +	
  <SID>	
  (if	
  version	
  >=	
  
7.00.000)	
  
– 	
  The	
  salt	
  is	
  the	
  value	
  0000000000000000	
  
40	
  
SecStore	
  
•  We	
  also	
  wrote	
  a	
  tool	
  which	
  decrypts	
  all	
  the	
  stuff	
  from	
  SAP	
  JAVA	
  
AS	
  Security	
  Storage	
  (SecStore_Cr.jar)	
  
•  Also,	
  SAP	
  Secure	
  Store	
  file	
  can	
  have	
  another	
  name	
  (ex.	
  
JUpgrade.proper;es)	
  and	
  store	
  other	
  interes;ng	
  data,	
  like:	
  
– 	
  Password	
  for	
  SAP	
  OS	
  user	
  (SIDADM)	
  
– 	
  DB	
  password	
  
– 	
  DDIC	
  password	
  
– 	
  etc…	
  
41	
  
Preven=on	
  
• 	
  Install	
  SAP	
  Note	
  1619539	
  
• 	
  Restrict	
  read	
  access	
  to	
  files	
  SecStore.properXes,	
  
JUpgrade.properXes,	
  and	
  SecStore.key	
  
• 	
  Managing	
  secure	
  storage	
  in	
  the	
  file	
  system:	
  
hp://help.sap.com/saphelp_nw70ehp2/helpdata/en/cd/
14c93ec2f7df6ae10000000a114084/content.htm	
  
42	
  
43	
  
Passwords	
  from	
  log	
  files	
  
Log	
  files	
  
•  We	
  know	
  about	
  many	
  places	
  where	
  SAP	
  writes	
  logs	
  
•  Administrator	
  can	
  define	
  the	
  verbosity	
  level	
  
•  Aacker	
  can	
  found	
  many	
  interes;ng	
  things	
  in	
  log	
  files:	
  
informa;on	
  about	
  the	
  system,	
  informa;on	
  about	
  the	
  users,	
  
even	
  session	
  informa;on	
  
•  Very	
  interes;ng	
  path	
  with	
  logs:	
  /sapinst_instdir/	
  	
  
	
  	
  
But	
  	
  what	
  about	
  passwords?	
  
44	
  
Log	
  files	
  
•  Passwords	
  in	
  SAP	
  log	
  files	
  looks	
  like	
  that:	
  
dev_umconfigurator.trc
45	
  
Log	
  files	
  
•  Some;mes,	
  we	
  can	
  find	
  a	
  clear	
  text	
  password	
  
sapinst_dev.<n>.log
46	
  
Log	
  files	
  
•  Some;mes,	
  we	
  can	
  find	
  an	
  encrypted	
  password	
  
47	
  
Log	
  files	
  
•  Guess	
  what	
  type	
  of	
  encryp;on	
  is	
  used?	
  J	
  
•  Right!	
  XOR	
  with	
  a	
  sta;c	
  hardcoded	
  key:	
  
31…65d
•  As	
  a	
  result,	
  we	
  have	
  a	
  decryptor:	
  
key="31XXXXXXXXXXXX5d"
def sxor(s1,s2):
return ''.join(chr(ord(a) ^ ord(b)) for a,b in zip(s1,s2))
def prepare(val):
encoco=val.split("|")
rez=""
for a in encoco:
rez= rez + str(hex(int(a)).replace("0x",""))
return rez
encr=prepare(raw_input("Enter encrypted password:"))
dec_pass=sxor(encr.decode("hex"),key.decode("hex"))
print "Decoded password is: "+dec_pass
48	
  
Log	
  files	
  
• 	
  The	
  same	
  story	
  with	
  the	
  config	
  file	
  	
  
	
  usrsap<SID>configusagetypes.properXes	
  
49	
  
Preven=on	
  
•  Don’t	
  use	
  TRACE_LEVEL	
  =	
  3	
  
•  Delete	
  traces	
  when	
  work	
  is	
  finished	
  
•  Mask	
  security-­‐sensi;ve	
  data	
  in	
  HTTP	
  access	
  log	
  	
  	
  
•  Incremen;ng/decremen;ng	
  the	
  trace	
  level:	
  
h  p s : / / h e l p . s a p . c o m / s a p h e l p _ n w p i 7 1 / h e l p d a t a / e n /
46/962416a5a613e8e10000000a155369/content.htm	
  
50	
  
51	
  
Passwords	
  from	
  SLD	
  config	
  file	
  
SLD	
  
•  SLD	
  is	
  the	
  central	
  informa;on	
  repository	
  for	
  your	
  system	
  
landscape	
  
•  It	
  contains	
  informa;on	
  about:	
  
– 	
  technical	
  systems	
  
– 	
  landscapes	
  
– 	
  business	
  systems	
  
– 	
  products	
  
– 	
  solware	
  components	
  in	
  your	
  system	
  landscape	
  
52	
  
SLD	
  password	
  files	
  
• 	
  	
  Configura;on	
  file:	
  usrsap<sid>DVEBMGS<nn>exe	
  slddest.cfg	
  	
  
– 	
  User	
  name	
  with	
  DataSupplierLD	
  role	
  
– 	
  User	
  password	
  (wooot!)	
  
– 	
  Host	
  name	
  
– 	
  Port	
  
Encrypted	
  by	
  DES	
  algorithm	
  in	
  the	
  early	
  version	
  of	
  SLD	
  
Sta;c	
  default	
  key	
  is:	
  0A…71F
But	
  if	
  user	
  specifies	
  the	
  key,	
  then	
  the	
  key	
  file	
  is	
  stored	
  near	
  the	
  
encrypted	
  data	
  file	
  in	
  slddest.cfg.key	
  
53	
  
SLD	
  password	
  files	
  
•  In	
  the	
  latest	
  versions	
  of	
  SLD,	
  another	
  algorithm	
  is	
  used:	
  
TripleDES	
  with	
  hardcoded	
  key	
  
54	
  
Preven=on	
  
•  Restrict	
  read	
  access	
  to	
  fileslddest.cfg	
  and	
  slddest.cfg.key	
  
•  Configuring	
  sldreg	
  and	
  transferring	
  data	
  to	
  SLD:	
  	
  
hp://help.sap.com/saphelp_nw70/helpdata/en/42/
ea5ff4b5d61bd9e10000000a11466f/content.htm	
  	
  	
  
55	
  
56	
  
Passwords	
  from	
  ABAP	
  SecStore	
  
Password	
  from	
  RSECTAB	
  	
  
•  The	
  secure	
  storage	
  is	
  a	
  component	
  of	
  the	
  SAP	
  Web	
  Applica;on	
  
Server	
  ABAP	
  
•  It	
  allows	
  the	
  encrypted	
  storage	
  of	
  sensi;ve	
  data	
  that	
  SAP	
  
applica;ons	
  require	
  when	
  logging	
  into	
  other	
  systems	
  
•  These	
  SAP	
  applica;ons	
  use	
  the	
  storage	
  to	
  store	
  passwords:	
  
–  RFC	
  des;na;ons	
  
–  Exchange	
  Infrastructure	
  (XI)	
  
–  LDAP	
  system	
  users	
  
–  SAPphone	
  
–  SAPconnect	
  
–  CCMS	
  (Generic	
  Request	
  and	
  Message	
  Generator)	
  
•  Table	
  RSECTAB	
  	
  
select rawtohex(DATA) from SAPSR3.RSECTAB
57	
  
Password	
  from	
  RSECTAB	
  	
  
58	
  
Password	
  from	
  RSECTAB	
  	
  
59	
  
Password	
  from	
  RSECTAB	
  	
  
•  TripleDES	
  3DES	
  mode:	
  DES-­‐EDE3	
  
•  The	
  triple	
  DES	
  algorithm	
  uses	
  the	
  DES-­‐EDE3	
  method	
  where	
  a	
  24	
  
byte	
  key	
  is	
  supplied.	
  This	
  means	
  there	
  are	
  three	
  DES	
  opera;ons	
  
in	
  the	
  sequence	
  encrypt-­‐decrypt-­‐encrypt	
  with	
  the	
  three	
  
different	
  keys.	
  The	
  first	
  key	
  will	
  be	
  bytes	
  1	
  to	
  8,	
  the	
  second	
  key	
  
bytes	
  9	
  to	
  16	
  and	
  the	
  third	
  key	
  bytes	
  17	
  to	
  24	
  
•  Two	
  rounds	
  
60	
  
Password	
  from	
  RSECTAB	
  	
  
•  First	
  round	
  
•  Encrypt:	
  	
  
– 	
  char	
  randomPrefix[2];	
  
– 	
  char	
  payload[109];	
  	
  
– 	
  char	
  payloadLength;	
  	
  
– 	
  char	
  magicLocal[4];	
  	
  
– 	
  char	
  magicGlobalSalted[4];	
  	
  
– 	
  char	
  recordIden;fierA7Hash[16];	
  	
  
61	
  
Password	
  from	
  RSECTAB	
  	
  
•  Key	
  for	
  the	
  first	
  round	
  of	
  encryp;on	
  base	
  on	
  default	
  key:	
  
Key’def[1] = Keydef[1] ^ (Hsup[0] & 0xF0)
Key’def[6] = Keydef[6] ^ (Hsup[0] & 0x0F)
Key’def[7] = Keydef[7] ^ (Hsup[3] & 0xF0)
Key’def[10] = Keydef[10] ^ (Hsup[1] & 0xF0)
Key’def[13] = Keydef[13] ^ (Hsup[1] & 0x0F)
Key’def[16] = Keydef[16] ^ (Hsup[4] & 0x0F)
Key’def[19] = Keydef[19] ^ (Hsup[2] & 0xF0)
Key’def[20] = Keydef[20] ^ (Hsup[2] & 0x0F)
	
  
•  Where	
  Hsup	
  is	
  md5(sidA7[3]+insnoA7[10])
62	
  
Password	
  from	
  RSECTAB	
  	
  
63	
  
Password	
  from	
  RSECTAB	
  	
  
•  Second	
  round	
  
•  Encrypt	
  all	
  data	
  with	
  the	
  default	
  key	
  	
  
64	
  
Password	
  from	
  RSECTAB	
  	
  
•  What	
  about	
  the	
  default	
  key?	
  
•  It	
  is	
  encrypted	
  via	
  3DES-­‐EDE2,	
  too	
  
•  But	
  the	
  key	
  for	
  this	
  encryp;on	
  is	
  hardcoded	
  
65	
  
Preven=on	
  
•  Change	
  the	
  default	
  key	
  	
  
•  SAP	
  Security	
  Note	
  1902611	
  
•  Choosing	
  your	
  own	
  key:	
  
hp://help.sap.com/saphelp_nw70ehp2/helpdata/en/e0/
f73d41945bdb2be10000000a1550b0/content.htm	
  	
  	
  
66	
  
67	
  
Passwords	
  from	
  DBCON	
  table	
  
DBCON	
  table	
  
•  SAP	
  has	
  a	
  connec;on	
  with	
  different	
  DBs	
  
•  Administrator	
  can	
  manage	
  this	
  connec;on	
  via	
  the	
  transac;on	
  
DBCO	
  
•  All	
  DB	
  connec;ons	
  informa;on	
  is	
  stored	
  encrypted	
  in	
  the	
  table	
  
DBCON	
  (Descrip;on	
  of	
  Database	
  Connec;ons)	
  
68	
  
DBCON	
  table	
  
•  	
  Encrypted	
  data	
  looks	
  like:	
  	
  
V01/0030ZctvSB67Wv1OuVLazse4ORik
– 	
  BASE64	
  +	
  DES	
  
– 	
  hardcoded	
  key:	
  59A…70E
– 	
  decrypted	
  data	
  includes	
  sta;c	
  salt:	
  BE HAPPY
69	
  
Preven=on	
  
•  Restrict	
  access	
  to	
  the	
  table	
  DBCON	
  
•  Restrict	
  access	
  to	
  the	
  transac;on	
  DBCO	
  
•  SAP	
  Security	
  Notes	
  1638280	
  and	
  1823566	
  	
  	
  
70	
  
71	
  
Passwords	
  from	
  HANA	
  
SAP	
  HANA	
  
•  User	
  details	
  (including	
  passwords)	
  stored	
  in	
  hdbuserstore	
  
•  Located	
  in	
  the	
  /usr/sap/hdbclient	
  directory	
  
•  About	
  hdbuserstore:	
  
‒  SSFS_HDB.DAT	
  
‒  with	
  user	
  data	
  
‒  with	
  keys	
  
	
  
72	
  
SAP	
  HANA	
  
•  SSFS_HDB.DAT	
  
•  Signature:	
  RSecSSFsData	
  
•  Algorithm:	
  3DES	
  
•  Default	
  key	
  is	
  the	
  same	
  as	
  in	
  the	
  ABAP	
  Security	
  Storage
73	
  
SAP	
  HANA	
  
•  SAP	
  HANA	
  –	
  in	
  memory	
  database	
  
•  But	
  it	
  drops	
  some	
  data	
  into	
  FS	
  
–  Backup	
  
–  Savepoint	
  
	
  
“The	
  SAP	
  HANA	
  database	
  holds	
  the	
  bulk	
  of	
  its	
  data	
  in	
  memory	
  for	
  maximum	
  
performance,	
  but	
  it	
  sXll	
  uses	
  persistent	
  disk	
  storage	
  to	
  provide	
  a	
  fallback	
  in	
  case	
  
of	
  failure.	
  Data	
  is	
  automaXcally	
  saved	
  from	
  memory	
  to	
  disk	
  at	
  regular	
  
savepoints.	
  The	
  data	
  belonging	
  to	
  a	
  savepoint	
  represents	
  a	
  consistent	
  state	
  of	
  
the	
  data	
  on	
  disk	
  and	
  remains	
  so	
  unXl	
  the	
  next	
  savepoint	
  operaXon	
  has	
  
completed.	
  Aber	
  a	
  power	
  failure,	
  the	
  database	
  can	
  be	
  restarted	
  like	
  any	
  disk-­‐
based	
  database	
  and	
  returns	
  to	
  its	
  last	
  consistent	
  state,”	
  	
  
	
  –	
  SAP	
  HANA	
  Security	
  Guide	
  
74	
  
SAP	
  HANA	
  
•  	
  “Data	
  volume	
  encrypXon	
  ensures	
  that	
  anyone	
  who	
  can	
  access	
  
the	
  data	
  volumes	
  on	
  disk	
  using	
  operaXng	
  system	
  commands	
  
cannot	
  see	
  the	
  actual	
  data.	
  If	
  data	
  volumes	
  are	
  encrypted,	
  all	
  
pages	
  that	
  reside	
  in	
  the	
  data	
  area	
  on	
  disk	
  are	
  encrypted	
  using	
  
the	
  AES-­‐256-­‐CBC	
  algorithm.”	
  
•  	
  “Aber	
  data	
  volume	
  encrypXon	
  has	
  been	
  enabled,	
  an	
  iniXal	
  page	
  
key	
  is	
  automaXcally	
  generated.	
  Page	
  keys	
  are	
  never	
  readable	
  in	
  
plain	
  text,	
  but	
  are	
  encrypted	
  themselves	
  using	
  a	
  dedicated	
  
persistence	
  encrypXon	
  root	
  key.”	
  
75	
  
SAP	
  HANA	
  
	
  “SAP	
  HANA	
  uses	
  SAP	
  NetWeaver	
  SSFS	
  to	
  protect	
  the	
  root	
  encrypXon	
  keys	
  that	
  
are	
  used	
  to	
  protect	
  all	
  encrypXon	
  keys	
  used	
  in	
  the	
  SAP	
  HANA	
  system	
  from	
  
unauthorized	
  access.”	
  
•  SSFS_HDB.DAT	
  
– 	
  HDB_SERVER/PERSISTENCE/ROOTKEY	
  
– 	
  HDB_SERVER/DPAPI	
  
•  The	
  persistence	
  encryp;on	
  feature	
  does	
  not	
  encrypt	
  the	
  
following	
  data:	
  
– 	
  Database	
  redo	
  log	
  files	
  
– 	
  Database	
  backups	
  
– 	
  Database	
  traces	
  
76	
  
Preven=on	
  
•  Change	
  the	
  encryp;on	
  key	
  aler	
  installa;on	
  
•  Restrict	
  access	
  to	
  the	
  key	
  file	
  
•  Restrict	
  access	
  to	
  the	
  DAT	
  file	
  
•  Security	
  guide	
  for	
  HANA	
  (p.	
  71)	
  
h&p://help.sap.com/hana/SAP_HANA_Security_Guide_en.pdf	
  
•  Secure	
  storage	
  in	
  the	
  file	
  system:	
  
h&p://help.sap.com/saphelp_nw70ehp2/helpdata/en/
a0/82dd0abbde4696b98a8be133b27f3b/content.htm	
  
	
  
77	
  
Etc..	
  
•  	
  ICF	
  Password	
  Repository	
  
–  ICFSECPASSWD	
  
•  	
  FI	
  module	
  passwords	
  
–  FIEB_PASSWORD	
  
•  	
  Oracle	
  Fail	
  Safe	
  
–  Stores	
  passwords	
  inside	
  the	
  ENVIRONMENT	
  variable	
  (Note	
  1764043	
  p.	
  4)	
  
•  	
  SAP	
  BusinessObjects	
  LCMuser	
  –	
  hardcoded	
  SVN	
  user	
  
–  SAP	
  BusinessObjects	
  Enterprise	
  XI.0LCM_repositorysvn_repository
conf	
  
•  	
  SAP	
  BusinessObjects	
  axis2	
  login:password	
  
–  axis2.xml	
  
	
  
78	
  
It	
  is	
  possible	
  to	
  protect	
  yourself	
  from	
  these	
  kinds	
  of	
  issues,	
  	
  
and	
  we	
  are	
  working	
  close	
  with	
  SAP	
  to	
  keep	
  customers	
  secure	
  
SAP	
  guides	
  
It’s	
  all	
  in	
  your	
  hands	
  
Regular	
  security	
  assessments	
  
ABAP	
  code	
  review	
  
Monitoring	
  technical	
  security	
  
Segrega=on	
  of	
  du=es	
  
79	
  
Conclusion	
  
 I'd	
  like	
  to	
  thank	
  SAP's	
  Product	
  Security	
  Response	
  Team	
  for	
  the	
  
great	
  cooperaXon	
  to	
  make	
  SAP	
  systems	
  more	
  secure.	
  Research	
  
is	
  always	
  ongoing,	
  and	
  we	
  can't	
  share	
  all	
  of	
  it	
  today.	
  If	
  you	
  want	
  
to	
   be	
   the	
   first	
   to	
   see	
   new	
   a&acks	
   and	
   demos,	
   follow	
   us	
   at	
  
@erpscan	
  and	
  a&end	
  future	
  presentaXons.	
  
	
  
PS:	
  
•  EAS-­‐SEC:	
  Recourse	
  which	
  combines	
  	
  
–  Guidelines	
  for	
  assessing	
  enterprise	
  applica;on	
  security	
  
–  Guidelines	
  for	
  assessing	
  custom	
  code	
  
–  Surveys	
  about	
  enterprise	
  applica;on	
  security	
  
80	
  
Future	
  work	
  

More Related Content

What's hot

SAP Security & GRC Framework
SAP Security & GRC FrameworkSAP Security & GRC Framework
SAP Security & GRC FrameworkHarish Sharma
 
sap basis transaction codes
sap basis transaction codessap basis transaction codes
sap basis transaction codesEOH SAP Services
 
L1_RISE_with_SAP_NNN_V3.4.pptx
L1_RISE_with_SAP_NNN_V3.4.pptxL1_RISE_with_SAP_NNN_V3.4.pptx
L1_RISE_with_SAP_NNN_V3.4.pptxGuruprasad Bellary
 
Anil kumar sap security & GRC
Anil kumar sap security & GRCAnil kumar sap security & GRC
Anil kumar sap security & GRCAnil Kumar
 
Grc 10 training
Grc 10 trainingGrc 10 training
Grc 10 trainingsuresh
 
Sap GRC Basic Information | GRC 12 online training
Sap GRC Basic Information | GRC 12 online trainingSap GRC Basic Information | GRC 12 online training
Sap GRC Basic Information | GRC 12 online traininggrconlinetraining
 
SAP HANA SPS08 Security
SAP HANA SPS08 SecuritySAP HANA SPS08 Security
SAP HANA SPS08 Security SAP Technology
 
Sap basis certification and interview questions answers
Sap basis certification and interview questions answersSap basis certification and interview questions answers
Sap basis certification and interview questions answersKrishna Praveen
 
Sap grc process control 10.0
Sap grc process control 10.0Sap grc process control 10.0
Sap grc process control 10.0Latha Kamal
 
Activate_Methodology_Summary.ppt
Activate_Methodology_Summary.pptActivate_Methodology_Summary.ppt
Activate_Methodology_Summary.pptMohamedOthman536425
 
SAP S4HANA Migration Cockpit.pdf
SAP S4HANA Migration Cockpit.pdfSAP S4HANA Migration Cockpit.pdf
SAP S4HANA Migration Cockpit.pdfKrishnaAkula4
 
081712 isaca-atl-auditing sap-grc
081712 isaca-atl-auditing sap-grc081712 isaca-atl-auditing sap-grc
081712 isaca-atl-auditing sap-grchkodali
 
SAP HANA 2.0 Cockpit Installation and Configuration.pdf
SAP HANA 2.0 Cockpit Installation and Configuration.pdfSAP HANA 2.0 Cockpit Installation and Configuration.pdf
SAP HANA 2.0 Cockpit Installation and Configuration.pdfYevilina Rizka
 
SplunkLive 2011 Beginners Session
SplunkLive 2011 Beginners SessionSplunkLive 2011 Beginners Session
SplunkLive 2011 Beginners SessionSplunk
 
ELK in Security Analytics
ELK in Security Analytics ELK in Security Analytics
ELK in Security Analytics nullowaspmumbai
 

What's hot (20)

SAP Security & GRC Framework
SAP Security & GRC FrameworkSAP Security & GRC Framework
SAP Security & GRC Framework
 
sap basis transaction codes
sap basis transaction codessap basis transaction codes
sap basis transaction codes
 
L1_RISE_with_SAP_NNN_V3.4.pptx
L1_RISE_with_SAP_NNN_V3.4.pptxL1_RISE_with_SAP_NNN_V3.4.pptx
L1_RISE_with_SAP_NNN_V3.4.pptx
 
Anil kumar sap security & GRC
Anil kumar sap security & GRCAnil kumar sap security & GRC
Anil kumar sap security & GRC
 
Grc 10 training
Grc 10 trainingGrc 10 training
Grc 10 training
 
Day5 R3 Basis Security
Day5 R3 Basis   SecurityDay5 R3 Basis   Security
Day5 R3 Basis Security
 
Sap GRC Basic Information | GRC 12 online training
Sap GRC Basic Information | GRC 12 online trainingSap GRC Basic Information | GRC 12 online training
Sap GRC Basic Information | GRC 12 online training
 
Sap grc-access-control-solution
Sap grc-access-control-solutionSap grc-access-control-solution
Sap grc-access-control-solution
 
SAP HANA SPS08 Security
SAP HANA SPS08 SecuritySAP HANA SPS08 Security
SAP HANA SPS08 Security
 
Sap basis certification and interview questions answers
Sap basis certification and interview questions answersSap basis certification and interview questions answers
Sap basis certification and interview questions answers
 
F5 Web Application Security
F5 Web Application SecurityF5 Web Application Security
F5 Web Application Security
 
Sap grc process control 10.0
Sap grc process control 10.0Sap grc process control 10.0
Sap grc process control 10.0
 
Activate_Methodology_Summary.ppt
Activate_Methodology_Summary.pptActivate_Methodology_Summary.ppt
Activate_Methodology_Summary.ppt
 
SAP S4HANA Migration Cockpit.pdf
SAP S4HANA Migration Cockpit.pdfSAP S4HANA Migration Cockpit.pdf
SAP S4HANA Migration Cockpit.pdf
 
081712 isaca-atl-auditing sap-grc
081712 isaca-atl-auditing sap-grc081712 isaca-atl-auditing sap-grc
081712 isaca-atl-auditing sap-grc
 
SAP SECURITY GRC
SAP SECURITY GRCSAP SECURITY GRC
SAP SECURITY GRC
 
Sap bw4 hana
Sap bw4 hanaSap bw4 hana
Sap bw4 hana
 
SAP HANA 2.0 Cockpit Installation and Configuration.pdf
SAP HANA 2.0 Cockpit Installation and Configuration.pdfSAP HANA 2.0 Cockpit Installation and Configuration.pdf
SAP HANA 2.0 Cockpit Installation and Configuration.pdf
 
SplunkLive 2011 Beginners Session
SplunkLive 2011 Beginners SessionSplunkLive 2011 Beginners Session
SplunkLive 2011 Beginners Session
 
ELK in Security Analytics
ELK in Security Analytics ELK in Security Analytics
ELK in Security Analytics
 

Viewers also liked

MLM MARKETING PLAN
MLM MARKETING PLANMLM MARKETING PLAN
MLM MARKETING PLANPhyo Wai Zaw
 
Chinese attack on USIS exploiting SAP vulnerability. Detailed review and comm...
Chinese attack on USIS exploiting SAP vulnerability. Detailed review and comm...Chinese attack on USIS exploiting SAP vulnerability. Detailed review and comm...
Chinese attack on USIS exploiting SAP vulnerability. Detailed review and comm...ERPScan
 
Oracle PeopleSoft applications are under attacks (Hack in Paris)
Oracle PeopleSoft applications are under attacks (Hack in Paris)Oracle PeopleSoft applications are under attacks (Hack in Paris)
Oracle PeopleSoft applications are under attacks (Hack in Paris)ERPScan
 
With big data comes big responsibility
With big data comes big responsibilityWith big data comes big responsibility
With big data comes big responsibilityERPScan
 
Following Component Architecture in Sitecore solutions - Anders Laub @ SUGCON...
Following Component Architecture in Sitecore solutions - Anders Laub @ SUGCON...Following Component Architecture in Sitecore solutions - Anders Laub @ SUGCON...
Following Component Architecture in Sitecore solutions - Anders Laub @ SUGCON...Anders Laub Christoffersen
 
EAS-SEC Project
EAS-SEC ProjectEAS-SEC Project
EAS-SEC ProjectERPScan
 
【2016.09】cvpaper.challenge2016
【2016.09】cvpaper.challenge2016【2016.09】cvpaper.challenge2016
【2016.09】cvpaper.challenge2016cvpaper. challenge
 
cvpaper.challenge@CVPR2015(Re-ID)
cvpaper.challenge@CVPR2015(Re-ID)cvpaper.challenge@CVPR2015(Re-ID)
cvpaper.challenge@CVPR2015(Re-ID)cvpaper. challenge
 
【2016.07】cvpaper.challenge2016
【2016.07】cvpaper.challenge2016【2016.07】cvpaper.challenge2016
【2016.07】cvpaper.challenge2016cvpaper. challenge
 
【2015.08】(5/5)cvpaper.challenge@CVPR2015
【2015.08】(5/5)cvpaper.challenge@CVPR2015【2015.08】(5/5)cvpaper.challenge@CVPR2015
【2015.08】(5/5)cvpaper.challenge@CVPR2015cvpaper. challenge
 
【2015.05】cvpaper.challenge@CVPR2015
【2015.05】cvpaper.challenge@CVPR2015【2015.05】cvpaper.challenge@CVPR2015
【2015.05】cvpaper.challenge@CVPR2015cvpaper. challenge
 
【2016.04】cvpaper.challenge2016
【2016.04】cvpaper.challenge2016【2016.04】cvpaper.challenge2016
【2016.04】cvpaper.challenge2016cvpaper. challenge
 
【2016.05】cvpaper.challenge2016
【2016.05】cvpaper.challenge2016【2016.05】cvpaper.challenge2016
【2016.05】cvpaper.challenge2016cvpaper. challenge
 
【2016.03】cvpaper.challenge2016
【2016.03】cvpaper.challenge2016【2016.03】cvpaper.challenge2016
【2016.03】cvpaper.challenge2016cvpaper. challenge
 
【2016.10】cvpaper.challenge2016
【2016.10】cvpaper.challenge2016【2016.10】cvpaper.challenge2016
【2016.10】cvpaper.challenge2016cvpaper. challenge
 
SAP Identity Management Overview
SAP Identity Management OverviewSAP Identity Management Overview
SAP Identity Management OverviewSAP Technology
 
cvpaper.challenge -サーベイの共有と可能性について- (画像応用技術専門委員会研究会 2016年7月)
cvpaper.challenge -サーベイの共有と可能性について- (画像応用技術専門委員会研究会 2016年7月)cvpaper.challenge -サーベイの共有と可能性について- (画像応用技術専門委員会研究会 2016年7月)
cvpaper.challenge -サーベイの共有と可能性について- (画像応用技術専門委員会研究会 2016年7月)cvpaper. challenge
 
【2016.06】cvpaper.challenge2016
【2016.06】cvpaper.challenge2016【2016.06】cvpaper.challenge2016
【2016.06】cvpaper.challenge2016cvpaper. challenge
 
これからのコンピュータビジョン技術 - cvpaper.challenge in PRMU Grand Challenge 2016 (PRMU研究会 2...
これからのコンピュータビジョン技術 - cvpaper.challenge in PRMU Grand Challenge 2016 (PRMU研究会 2...これからのコンピュータビジョン技術 - cvpaper.challenge in PRMU Grand Challenge 2016 (PRMU研究会 2...
これからのコンピュータビジョン技術 - cvpaper.challenge in PRMU Grand Challenge 2016 (PRMU研究会 2...cvpaper. challenge
 

Viewers also liked (20)

MLM MARKETING PLAN
MLM MARKETING PLANMLM MARKETING PLAN
MLM MARKETING PLAN
 
THE WORLD IN A NUTSHELL
THE WORLD IN A  NUTSHELLTHE WORLD IN A  NUTSHELL
THE WORLD IN A NUTSHELL
 
Chinese attack on USIS exploiting SAP vulnerability. Detailed review and comm...
Chinese attack on USIS exploiting SAP vulnerability. Detailed review and comm...Chinese attack on USIS exploiting SAP vulnerability. Detailed review and comm...
Chinese attack on USIS exploiting SAP vulnerability. Detailed review and comm...
 
Oracle PeopleSoft applications are under attacks (Hack in Paris)
Oracle PeopleSoft applications are under attacks (Hack in Paris)Oracle PeopleSoft applications are under attacks (Hack in Paris)
Oracle PeopleSoft applications are under attacks (Hack in Paris)
 
With big data comes big responsibility
With big data comes big responsibilityWith big data comes big responsibility
With big data comes big responsibility
 
Following Component Architecture in Sitecore solutions - Anders Laub @ SUGCON...
Following Component Architecture in Sitecore solutions - Anders Laub @ SUGCON...Following Component Architecture in Sitecore solutions - Anders Laub @ SUGCON...
Following Component Architecture in Sitecore solutions - Anders Laub @ SUGCON...
 
EAS-SEC Project
EAS-SEC ProjectEAS-SEC Project
EAS-SEC Project
 
【2016.09】cvpaper.challenge2016
【2016.09】cvpaper.challenge2016【2016.09】cvpaper.challenge2016
【2016.09】cvpaper.challenge2016
 
cvpaper.challenge@CVPR2015(Re-ID)
cvpaper.challenge@CVPR2015(Re-ID)cvpaper.challenge@CVPR2015(Re-ID)
cvpaper.challenge@CVPR2015(Re-ID)
 
【2016.07】cvpaper.challenge2016
【2016.07】cvpaper.challenge2016【2016.07】cvpaper.challenge2016
【2016.07】cvpaper.challenge2016
 
【2015.08】(5/5)cvpaper.challenge@CVPR2015
【2015.08】(5/5)cvpaper.challenge@CVPR2015【2015.08】(5/5)cvpaper.challenge@CVPR2015
【2015.08】(5/5)cvpaper.challenge@CVPR2015
 
【2015.05】cvpaper.challenge@CVPR2015
【2015.05】cvpaper.challenge@CVPR2015【2015.05】cvpaper.challenge@CVPR2015
【2015.05】cvpaper.challenge@CVPR2015
 
【2016.04】cvpaper.challenge2016
【2016.04】cvpaper.challenge2016【2016.04】cvpaper.challenge2016
【2016.04】cvpaper.challenge2016
 
【2016.05】cvpaper.challenge2016
【2016.05】cvpaper.challenge2016【2016.05】cvpaper.challenge2016
【2016.05】cvpaper.challenge2016
 
【2016.03】cvpaper.challenge2016
【2016.03】cvpaper.challenge2016【2016.03】cvpaper.challenge2016
【2016.03】cvpaper.challenge2016
 
【2016.10】cvpaper.challenge2016
【2016.10】cvpaper.challenge2016【2016.10】cvpaper.challenge2016
【2016.10】cvpaper.challenge2016
 
SAP Identity Management Overview
SAP Identity Management OverviewSAP Identity Management Overview
SAP Identity Management Overview
 
cvpaper.challenge -サーベイの共有と可能性について- (画像応用技術専門委員会研究会 2016年7月)
cvpaper.challenge -サーベイの共有と可能性について- (画像応用技術専門委員会研究会 2016年7月)cvpaper.challenge -サーベイの共有と可能性について- (画像応用技術専門委員会研究会 2016年7月)
cvpaper.challenge -サーベイの共有と可能性について- (画像応用技術専門委員会研究会 2016年7月)
 
【2016.06】cvpaper.challenge2016
【2016.06】cvpaper.challenge2016【2016.06】cvpaper.challenge2016
【2016.06】cvpaper.challenge2016
 
これからのコンピュータビジョン技術 - cvpaper.challenge in PRMU Grand Challenge 2016 (PRMU研究会 2...
これからのコンピュータビジョン技術 - cvpaper.challenge in PRMU Grand Challenge 2016 (PRMU研究会 2...これからのコンピュータビジョン技術 - cvpaper.challenge in PRMU Grand Challenge 2016 (PRMU研究会 2...
これからのコンピュータビジョン技術 - cvpaper.challenge in PRMU Grand Challenge 2016 (PRMU研究会 2...
 

Similar to Secure Your SAP Investments with ERPScan

SAP SDM Hacking
SAP SDM HackingSAP SDM Hacking
SAP SDM HackingERPScan
 
Architecture vulnerabilities in SAP platforms
Architecture vulnerabilities in SAP platformsArchitecture vulnerabilities in SAP platforms
Architecture vulnerabilities in SAP platformsERPScan
 
CONFidence 2014: Dimitriy Chastuhin: All your sap p@$$w0яd z belong to us
CONFidence 2014: Dimitriy Chastuhin:  All your sap p@$$w0яd z belong to usCONFidence 2014: Dimitriy Chastuhin:  All your sap p@$$w0яd z belong to us
CONFidence 2014: Dimitriy Chastuhin: All your sap p@$$w0яd z belong to usPROIDEA
 
DEF CON 23 - CASSIDY LEVERETT LEE - switches get stitches
DEF CON 23 - CASSIDY LEVERETT LEE - switches get stitchesDEF CON 23 - CASSIDY LEVERETT LEE - switches get stitches
DEF CON 23 - CASSIDY LEVERETT LEE - switches get stitchesFelipe Prado
 
A crushing blow at the heart of SAP’s J2EE Engine.
A crushing blow at the heart of SAP’s J2EE Engine. A crushing blow at the heart of SAP’s J2EE Engine.
A crushing blow at the heart of SAP’s J2EE Engine. ERPScan
 
Injecting evil code in your SAP J2EE systems. Security of SAP Software Deploy...
Injecting evil code in your SAP J2EE systems. Security of SAP Software Deploy...Injecting evil code in your SAP J2EE systems. Security of SAP Software Deploy...
Injecting evil code in your SAP J2EE systems. Security of SAP Software Deploy...ERPScan
 
SAP (in)security: New and best
SAP (in)security: New and bestSAP (in)security: New and best
SAP (in)security: New and bestERPScan
 
SAP portal: breaking and forensicating
SAP portal: breaking and forensicating SAP portal: breaking and forensicating
SAP portal: breaking and forensicating ERPScan
 
Breaking, forensicating and anti-forensicating SAP Portal and J2EE Engine
Breaking, forensicating and anti-forensicating SAP Portal and J2EE EngineBreaking, forensicating and anti-forensicating SAP Portal and J2EE Engine
Breaking, forensicating and anti-forensicating SAP Portal and J2EE EngineERPScan
 
Security Best Practice: Oracle passwords, but secure!
Security Best Practice: Oracle passwords, but secure!Security Best Practice: Oracle passwords, but secure!
Security Best Practice: Oracle passwords, but secure!Stefan Oehrli
 
Attacking SAP Mobile
Attacking SAP MobileAttacking SAP Mobile
Attacking SAP MobileERPScan
 
EAS-SEC: Framework for securing business applications
EAS-SEC: Framework for securing business applicationsEAS-SEC: Framework for securing business applications
EAS-SEC: Framework for securing business applicationsERPScan
 
Shameful secrets of proprietary network protocols
Shameful secrets of proprietary network protocolsShameful secrets of proprietary network protocols
Shameful secrets of proprietary network protocolsSlawomir Jasek
 
Securing Your APIs against the Recent Vulnerabilities in SSLv2/SSLv3
Securing Your APIs against the Recent Vulnerabilities in SSLv2/SSLv3 Securing Your APIs against the Recent Vulnerabilities in SSLv2/SSLv3
Securing Your APIs against the Recent Vulnerabilities in SSLv2/SSLv3 Akana
 
Top 10 most interesting vulnerabilities and attacks in SAP
Top 10 most interesting vulnerabilities and attacks in SAPTop 10 most interesting vulnerabilities and attacks in SAP
Top 10 most interesting vulnerabilities and attacks in SAPERPScan
 
How to Secure Your Scylla Deployment: Authorization, Encryption, LDAP Authent...
How to Secure Your Scylla Deployment: Authorization, Encryption, LDAP Authent...How to Secure Your Scylla Deployment: Authorization, Encryption, LDAP Authent...
How to Secure Your Scylla Deployment: Authorization, Encryption, LDAP Authent...ScyllaDB
 
Application and Server Security
Application and Server SecurityApplication and Server Security
Application and Server SecurityBrian Pontarelli
 
Shameful Secrets of Proprietary Network Protocols - OWASP AppSec EU 2014
Shameful Secrets of Proprietary Network Protocols - OWASP AppSec EU 2014Shameful Secrets of Proprietary Network Protocols - OWASP AppSec EU 2014
Shameful Secrets of Proprietary Network Protocols - OWASP AppSec EU 2014Jakub Kałużny
 
Security Best Practice: Oracle passwords, but secure!
Security Best Practice: Oracle passwords, but secure!Security Best Practice: Oracle passwords, but secure!
Security Best Practice: Oracle passwords, but secure!Stefan Oehrli
 
Эксплуатируем неэксплуатируемые уязвимости SAP
Эксплуатируем неэксплуатируемые уязвимости SAPЭксплуатируем неэксплуатируемые уязвимости SAP
Эксплуатируем неэксплуатируемые уязвимости SAPPositive Hack Days
 

Similar to Secure Your SAP Investments with ERPScan (20)

SAP SDM Hacking
SAP SDM HackingSAP SDM Hacking
SAP SDM Hacking
 
Architecture vulnerabilities in SAP platforms
Architecture vulnerabilities in SAP platformsArchitecture vulnerabilities in SAP platforms
Architecture vulnerabilities in SAP platforms
 
CONFidence 2014: Dimitriy Chastuhin: All your sap p@$$w0яd z belong to us
CONFidence 2014: Dimitriy Chastuhin:  All your sap p@$$w0яd z belong to usCONFidence 2014: Dimitriy Chastuhin:  All your sap p@$$w0яd z belong to us
CONFidence 2014: Dimitriy Chastuhin: All your sap p@$$w0яd z belong to us
 
DEF CON 23 - CASSIDY LEVERETT LEE - switches get stitches
DEF CON 23 - CASSIDY LEVERETT LEE - switches get stitchesDEF CON 23 - CASSIDY LEVERETT LEE - switches get stitches
DEF CON 23 - CASSIDY LEVERETT LEE - switches get stitches
 
A crushing blow at the heart of SAP’s J2EE Engine.
A crushing blow at the heart of SAP’s J2EE Engine. A crushing blow at the heart of SAP’s J2EE Engine.
A crushing blow at the heart of SAP’s J2EE Engine.
 
Injecting evil code in your SAP J2EE systems. Security of SAP Software Deploy...
Injecting evil code in your SAP J2EE systems. Security of SAP Software Deploy...Injecting evil code in your SAP J2EE systems. Security of SAP Software Deploy...
Injecting evil code in your SAP J2EE systems. Security of SAP Software Deploy...
 
SAP (in)security: New and best
SAP (in)security: New and bestSAP (in)security: New and best
SAP (in)security: New and best
 
SAP portal: breaking and forensicating
SAP portal: breaking and forensicating SAP portal: breaking and forensicating
SAP portal: breaking and forensicating
 
Breaking, forensicating and anti-forensicating SAP Portal and J2EE Engine
Breaking, forensicating and anti-forensicating SAP Portal and J2EE EngineBreaking, forensicating and anti-forensicating SAP Portal and J2EE Engine
Breaking, forensicating and anti-forensicating SAP Portal and J2EE Engine
 
Security Best Practice: Oracle passwords, but secure!
Security Best Practice: Oracle passwords, but secure!Security Best Practice: Oracle passwords, but secure!
Security Best Practice: Oracle passwords, but secure!
 
Attacking SAP Mobile
Attacking SAP MobileAttacking SAP Mobile
Attacking SAP Mobile
 
EAS-SEC: Framework for securing business applications
EAS-SEC: Framework for securing business applicationsEAS-SEC: Framework for securing business applications
EAS-SEC: Framework for securing business applications
 
Shameful secrets of proprietary network protocols
Shameful secrets of proprietary network protocolsShameful secrets of proprietary network protocols
Shameful secrets of proprietary network protocols
 
Securing Your APIs against the Recent Vulnerabilities in SSLv2/SSLv3
Securing Your APIs against the Recent Vulnerabilities in SSLv2/SSLv3 Securing Your APIs against the Recent Vulnerabilities in SSLv2/SSLv3
Securing Your APIs against the Recent Vulnerabilities in SSLv2/SSLv3
 
Top 10 most interesting vulnerabilities and attacks in SAP
Top 10 most interesting vulnerabilities and attacks in SAPTop 10 most interesting vulnerabilities and attacks in SAP
Top 10 most interesting vulnerabilities and attacks in SAP
 
How to Secure Your Scylla Deployment: Authorization, Encryption, LDAP Authent...
How to Secure Your Scylla Deployment: Authorization, Encryption, LDAP Authent...How to Secure Your Scylla Deployment: Authorization, Encryption, LDAP Authent...
How to Secure Your Scylla Deployment: Authorization, Encryption, LDAP Authent...
 
Application and Server Security
Application and Server SecurityApplication and Server Security
Application and Server Security
 
Shameful Secrets of Proprietary Network Protocols - OWASP AppSec EU 2014
Shameful Secrets of Proprietary Network Protocols - OWASP AppSec EU 2014Shameful Secrets of Proprietary Network Protocols - OWASP AppSec EU 2014
Shameful Secrets of Proprietary Network Protocols - OWASP AppSec EU 2014
 
Security Best Practice: Oracle passwords, but secure!
Security Best Practice: Oracle passwords, but secure!Security Best Practice: Oracle passwords, but secure!
Security Best Practice: Oracle passwords, but secure!
 
Эксплуатируем неэксплуатируемые уязвимости SAP
Эксплуатируем неэксплуатируемые уязвимости SAPЭксплуатируем неэксплуатируемые уязвимости SAP
Эксплуатируем неэксплуатируемые уязвимости SAP
 

More from ERPScan

The latest changes to SAP cybersecurity landscape
The latest changes to SAP cybersecurity landscapeThe latest changes to SAP cybersecurity landscape
The latest changes to SAP cybersecurity landscapeERPScan
 
Oracle PeopleSoft applications are under attack (HITB AMS)
Oracle PeopleSoft applications are under attack (HITB AMS)Oracle PeopleSoft applications are under attack (HITB AMS)
Oracle PeopleSoft applications are under attack (HITB AMS)ERPScan
 
Business breakdown vulnerabilities in ERP via ICS and ICS via ERP
Business breakdown vulnerabilities in ERP via ICS and ICS via ERPBusiness breakdown vulnerabilities in ERP via ICS and ICS via ERP
Business breakdown vulnerabilities in ERP via ICS and ICS via ERPERPScan
 
5 real ways to destroy business by breaking SAP applications
5 real ways to destroy business by breaking SAP applications5 real ways to destroy business by breaking SAP applications
5 real ways to destroy business by breaking SAP applicationsERPScan
 
SAP security made easy
SAP security made easySAP security made easy
SAP security made easyERPScan
 
SAP security landscape. How to protect(hack) your(their) big business
SAP security landscape. How to protect(hack) your(their) big businessSAP security landscape. How to protect(hack) your(their) big business
SAP security landscape. How to protect(hack) your(their) big businessERPScan
 
13 real ways to destroy business by breaking company’s SAP applications
13 real ways to destroy business by breaking company’s SAP applications13 real ways to destroy business by breaking company’s SAP applications
13 real ways to destroy business by breaking company’s SAP applicationsERPScan
 
If I want a perfect cyberweapon, I'll target ERP - second edition
If I want a perfect cyberweapon, I'll target ERP - second editionIf I want a perfect cyberweapon, I'll target ERP - second edition
If I want a perfect cyberweapon, I'll target ERP - second editionERPScan
 
Assess and monitor SAP security
Assess and monitor SAP securityAssess and monitor SAP security
Assess and monitor SAP securityERPScan
 
Practical SAP pentesting (B-Sides San Paulo)
Practical SAP pentesting (B-Sides San Paulo)Practical SAP pentesting (B-Sides San Paulo)
Practical SAP pentesting (B-Sides San Paulo)ERPScan
 
Practical SAP pentesting workshop (NullCon Goa)
Practical SAP pentesting workshop (NullCon Goa)Practical SAP pentesting workshop (NullCon Goa)
Practical SAP pentesting workshop (NullCon Goa)ERPScan
 
If I want a perfect cyberweapon, I'll target ERP
If I want a perfect cyberweapon, I'll target ERPIf I want a perfect cyberweapon, I'll target ERP
If I want a perfect cyberweapon, I'll target ERPERPScan
 
Securing SAP in 5 steps
Securing SAP in 5 stepsSecuring SAP in 5 steps
Securing SAP in 5 stepsERPScan
 
What CISOs should know about SAP security
What CISOs should know about SAP securityWhat CISOs should know about SAP security
What CISOs should know about SAP securityERPScan
 
Practical pentesting of ERPs and business applications
Practical pentesting of ERPs and business applicationsPractical pentesting of ERPs and business applications
Practical pentesting of ERPs and business applicationsERPScan
 
SAP security in figures
SAP security in figuresSAP security in figures
SAP security in figuresERPScan
 
Breaking SAP portal (DeepSec)
Breaking SAP portal (DeepSec)Breaking SAP portal (DeepSec)
Breaking SAP portal (DeepSec)ERPScan
 
Breaking SAP portal (HashDays)
Breaking SAP portal (HashDays)Breaking SAP portal (HashDays)
Breaking SAP portal (HashDays)ERPScan
 
SSRF vs. Business-critical applications. Part 2. New vectors and connect-back...
SSRF vs. Business-critical applications. Part 2. New vectors and connect-back...SSRF vs. Business-critical applications. Part 2. New vectors and connect-back...
SSRF vs. Business-critical applications. Part 2. New vectors and connect-back...ERPScan
 

More from ERPScan (19)

The latest changes to SAP cybersecurity landscape
The latest changes to SAP cybersecurity landscapeThe latest changes to SAP cybersecurity landscape
The latest changes to SAP cybersecurity landscape
 
Oracle PeopleSoft applications are under attack (HITB AMS)
Oracle PeopleSoft applications are under attack (HITB AMS)Oracle PeopleSoft applications are under attack (HITB AMS)
Oracle PeopleSoft applications are under attack (HITB AMS)
 
Business breakdown vulnerabilities in ERP via ICS and ICS via ERP
Business breakdown vulnerabilities in ERP via ICS and ICS via ERPBusiness breakdown vulnerabilities in ERP via ICS and ICS via ERP
Business breakdown vulnerabilities in ERP via ICS and ICS via ERP
 
5 real ways to destroy business by breaking SAP applications
5 real ways to destroy business by breaking SAP applications5 real ways to destroy business by breaking SAP applications
5 real ways to destroy business by breaking SAP applications
 
SAP security made easy
SAP security made easySAP security made easy
SAP security made easy
 
SAP security landscape. How to protect(hack) your(their) big business
SAP security landscape. How to protect(hack) your(their) big businessSAP security landscape. How to protect(hack) your(their) big business
SAP security landscape. How to protect(hack) your(their) big business
 
13 real ways to destroy business by breaking company’s SAP applications
13 real ways to destroy business by breaking company’s SAP applications13 real ways to destroy business by breaking company’s SAP applications
13 real ways to destroy business by breaking company’s SAP applications
 
If I want a perfect cyberweapon, I'll target ERP - second edition
If I want a perfect cyberweapon, I'll target ERP - second editionIf I want a perfect cyberweapon, I'll target ERP - second edition
If I want a perfect cyberweapon, I'll target ERP - second edition
 
Assess and monitor SAP security
Assess and monitor SAP securityAssess and monitor SAP security
Assess and monitor SAP security
 
Practical SAP pentesting (B-Sides San Paulo)
Practical SAP pentesting (B-Sides San Paulo)Practical SAP pentesting (B-Sides San Paulo)
Practical SAP pentesting (B-Sides San Paulo)
 
Practical SAP pentesting workshop (NullCon Goa)
Practical SAP pentesting workshop (NullCon Goa)Practical SAP pentesting workshop (NullCon Goa)
Practical SAP pentesting workshop (NullCon Goa)
 
If I want a perfect cyberweapon, I'll target ERP
If I want a perfect cyberweapon, I'll target ERPIf I want a perfect cyberweapon, I'll target ERP
If I want a perfect cyberweapon, I'll target ERP
 
Securing SAP in 5 steps
Securing SAP in 5 stepsSecuring SAP in 5 steps
Securing SAP in 5 steps
 
What CISOs should know about SAP security
What CISOs should know about SAP securityWhat CISOs should know about SAP security
What CISOs should know about SAP security
 
Practical pentesting of ERPs and business applications
Practical pentesting of ERPs and business applicationsPractical pentesting of ERPs and business applications
Practical pentesting of ERPs and business applications
 
SAP security in figures
SAP security in figuresSAP security in figures
SAP security in figures
 
Breaking SAP portal (DeepSec)
Breaking SAP portal (DeepSec)Breaking SAP portal (DeepSec)
Breaking SAP portal (DeepSec)
 
Breaking SAP portal (HashDays)
Breaking SAP portal (HashDays)Breaking SAP portal (HashDays)
Breaking SAP portal (HashDays)
 
SSRF vs. Business-critical applications. Part 2. New vectors and connect-back...
SSRF vs. Business-critical applications. Part 2. New vectors and connect-back...SSRF vs. Business-critical applications. Part 2. New vectors and connect-back...
SSRF vs. Business-critical applications. Part 2. New vectors and connect-back...
 

Recently uploaded

Unit 1.1 Excite Part 1, class 9, cbse...
Unit 1.1 Excite Part 1, class 9, cbse...Unit 1.1 Excite Part 1, class 9, cbse...
Unit 1.1 Excite Part 1, class 9, cbse...aditisharan08
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...MyIntelliSource, Inc.
 
What is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWhat is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWave PLM
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfkalichargn70th171
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comFatema Valibhai
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...ICS
 
5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdfWave PLM
 
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...soniya singh
 
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...gurkirankumar98700
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsAlberto González Trastoy
 
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxKnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxTier1 app
 
cybersecurity notes for mca students for learning
cybersecurity notes for mca students for learningcybersecurity notes for mca students for learning
cybersecurity notes for mca students for learningVitsRangannavar
 
Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
DNT_Corporate presentation know about us
DNT_Corporate presentation know about usDNT_Corporate presentation know about us
DNT_Corporate presentation know about usDynamic Netsoft
 
Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)OPEN KNOWLEDGE GmbH
 
Project Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanationProject Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanationkaushalgiri8080
 
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio, Inc.
 
Asset Management Software - Infographic
Asset Management Software - InfographicAsset Management Software - Infographic
Asset Management Software - InfographicHr365.us smith
 
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataAdobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataBradBedford3
 

Recently uploaded (20)

Unit 1.1 Excite Part 1, class 9, cbse...
Unit 1.1 Excite Part 1, class 9, cbse...Unit 1.1 Excite Part 1, class 9, cbse...
Unit 1.1 Excite Part 1, class 9, cbse...
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
 
What is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWhat is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need It
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.com
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
 
5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf
 
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
 
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
 
Call Girls In Mukherjee Nagar 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
Call Girls In Mukherjee Nagar 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...Call Girls In Mukherjee Nagar 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
Call Girls In Mukherjee Nagar 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
 
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxKnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
 
cybersecurity notes for mca students for learning
cybersecurity notes for mca students for learningcybersecurity notes for mca students for learning
cybersecurity notes for mca students for learning
 
Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝
 
DNT_Corporate presentation know about us
DNT_Corporate presentation know about usDNT_Corporate presentation know about us
DNT_Corporate presentation know about us
 
Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)
 
Project Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanationProject Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanation
 
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
 
Asset Management Software - Infographic
Asset Management Software - InfographicAsset Management Software - Infographic
Asset Management Software - Infographic
 
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataAdobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
 

Secure Your SAP Investments with ERPScan

  • 1. Invest  in  security   to  secure  investments   All  your  SAP  Passwords   belong  to  us.     Dmitry  Chastuchin   Director,  Security  Consul;ng  ERPScan.      
  • 2. About  ERPScan   •  The   only   360-­‐degree   SAP   Security   solu;on   -­‐   ERPScan   Security   Monitoring  Suite  for  SAP   •  Leader  by  the  number  of  acknowledgements  from  SAP  (  150+  )   •  60+  presenta=ons  key  security  conferences  worldwide   •  25  Awards  and  nomina=ons   •  Research  team  -­‐  20  experts  with  experience  in    different  areas   of  security   •  Headquarters  in  Palo  Alto  (US)  and  Amsterdam  (EU)       2  
  • 3. SAP   •  The  most  popular  business  applica;on   •  More  than  250000  customers  worldwide     •  More  than  83  %  of  Forbes  500  run  SAP   3  
  • 4. SAP  security   Espionage   •  Stealing  financial  informa;on   •  Stealing  corporate  secrets   •  Stealing  supplier  and  customer  lists   •  Stealing  HR  data   Fraud   •  False  transac;ons   •  Modifica;on  of  master  data   Sabotage   •  Denial  of  service   •  Modifica;on  of  financial  reports   •  Access  to  technology  network  (SCADA)  by  trust  rela;ons   4  
  • 5. Is  it  remotely  exploitable?       5000+    non-­‐web  SAP  services  exposed  in  the  world    including  Dispatcher,  Message  server,  SapHostControl,  etc.     5  
  • 6. Is  it  remotely  exploitable?       0 1 2 3 4 5 6 7 8 9 SAP Dispatcher SAP MMC SAP Message Server SAP HostControl SAP ITS Agate SAP Message Server httpd 6  
  • 7. SAP  MMC  –  overview   •  MMC  is  installed  by  default  on  port  5<ID>13   •  Used  for  remote  management  of  SAP  servers   •  Commands  executed  via  SOAP  interface   •  By  default,  SSL  is  not  implemented   •  Administra;ve  password  transmied  using  basic  auth  (Base64)   •  By  sniffing  this  password,  we  can  get  full  control  over  the  server       7  
  • 8. SAP  MMC  –  aSacks   •  Many  aacks  can  be  implemented  without  authen;ca;on   •  Aacks  can  be  executed  by  sending  SOAP  requests   •  Mostly,  it  is  informa;on  disclosure  and  denial  of  service   •  Also,  OS  command  execu;on     8  
  • 9. Advanced  MMC  aSacks   <?xml version="1.0"?> <SOAP-ENV:Envelope xmlns:SOAP-ENV="http://schemas.xmlsoap.org/soap/envelope/" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:xs="http:// www.w3.org/2001/XMLSchema"> <SOAP-ENV:Header> <sapsess:Session xmlns:sapsess="http://www.sap.com/webas/630/soap/features/ session/"> <enableSession>true</enableSession> </sapsess:Session> </SOAP-ENV:Header> <SOAP-ENV:Body> <ns1:ReadLogFile xmlns:ns1="urn:SAPControl"> <filename>j2ee/cluster/server0/log/system/userinterface.log</filename> <filter/> <language/> <maxentries>%COUNT%</maxentries> <statecookie>EOF</statecookie> </ns1:ReadLogFile> </SOAP-ENV:Body> </SOAP-ENV:Envelope> 9  
  • 10. PWN   If  an  a&acker  can  read  a  file  from  server  OS,  he  can  get  clear  text   passwords  of  SAP  users  and,  as  a  result,  compromise  the  SAP   system   10  
  • 12. Passwords  on  client  side   User  name   Password   SAP*   06071992   PASS   DDIC   19920706   TMSADM   PASSWORD   $1Pawd2&   EARLYWATCH   SUPPORT   SAPCPIC   ADMIN   12  
  • 13. 13   Passwords  on  client  side  
  • 14. Passwords  on  client  side   •  Aack  via  Ac;veX   ‒  A  lot  of  issues  with  RCE  inside  (1519966,  1327004,  1092631,  …)   •  Aack  via  client  bugs   ‒  Buffer  overflow  in  saplogon.exe  (1504547)     What  aler  that?     SapLogon  shortcuts!     Olen,  lazy  users  store  password  for  SAP  account  in  shortcuts     14  
  • 15. Passwords  on  client  side   [System] Name=DM0 Description=Test Sap Server Client=800 [User] Name=SAP* Language=EN Password=PW_48B7231FD1FE390C [Function] Title=myShortcut Command=se16 [Configuration] WorkDir=C:Documents and SettingsAdministratorMy DocumentsSAPSAP GUI [Options] Reuse=1   This  is  how  a  typical  shortcut  looks  like…       File: <name>.sap 15  
  • 16. Passwords  on  client  side   [Label] Key1=myShortcut [Command] Key1=- desc="Test Sap Server" -sid="DM0" -clt="800" -u="SAP*" -l="EN" -tit="myShortcut" -cmd="se16" -wd="C:Documents and SettingsAdministratorMy DocumentsSAPSAP GUI" -ok="/nse16" -pwenc="PW_48B7231FD1FE390C"       …or  like  that                 File: sapshortcut.ini 16  
  • 17. Passwords  on  client  side   pwenc="PW_48B7231FD1FE390C" PW_48B7231FD1FE390C 48B7231FD1FE390C   I  used  this  password:  06071992     Looks  like  XOR  encryp;on     17  
  • 18. Passwords  on  client  side   •  Aler  a  few  experiments,  we  found  out:   –  Yes,  this  is  XOR     –  Yes,  the  key  is  sta;c  for  all  SAPLogon     •  The  key  is:     788113…dc49b0         18  
  • 19. Passwords  on  client  side   •  …and  the  PY  code  to  decrypt       key="788…" def sxor(s1,s2): return ''.join(chr(ord(a) ^ ord(b)) for a,b in zip(s1,s2)) enc_pass="PW_48B7231FD1FE390C" dec_pass=sxor(enc_pass[3:].decode("hex"),key.decode("hex")) print "Decoded password is: "+dec_pass   19  
  • 20. Preven=on   •  Don’t  use  SAPGUI  6.4  (there  are  no  patches  for  some   vulns)   •  Patch  SAPGUI  with  the  latest  SP   •  Don’t  store  password  in  shortcuts     •  (HKCUSolwareSAPSAPShortcutSecurity   EnablePassword=0)   •  Make  sure  that  you  do  not  ac;vate  the  storage  of   passwords  in  SAP  shortcuts   •  Authen;ca;on  security  for  SAP  shortcuts:   hp://help.sap.com/SAPHELP_NWPI71/helpdata/en/4d/dc9db9bc0e02cfe10000000a42189b/ content.htm     20  
  • 21. 21   Passwords  from  USR02,  USH02,  USRPWDHISTORY  
  • 22. USR02  password  hash   •  Well  known  password  area   •  Hash  algorithm:   –  CODVN  A   –  CODVN  B  (MD5-­‐based)   –  CODVN  D  (MD5-­‐based)   –  CODVN  E  (MD5-­‐based)   –  CODVN  F  (SHA1-­‐based)   –  CODVN  G  (Code  versions  B  &  F)   –  CODVN  H  (SHA-­‐1-­‐based)   –  CODVN  I  (Code  versions  B,  F  &  H)   •  Just  use  John  the  Ripper   22  
  • 23. Preven=on   •  Use  the  latest  algorithm   •  SAP  Note  2467:  Password  rules  and  preven;ng  incorrect  logons   •  SAP  Note  721119:  Logon  with  (delivered)  default  user  fails   •  SAP  Note  735356:  Special  character  in  passwords;  reac;va;on  not  possible   •  SAP  Note  862989:  New  password  rules  as  of  SAP  NetWeaver  2004s   •  SAP  Note  874738:  New  password  hash  calcula;on  procedure  (code  version  E)   •  SAP  Note  991968:  Value  list  for  login/password_hash_algorithm   •  SAP  Note  1023437:  Downwardly  incompa;ble  passwords  since  NW2004s   •  SAP  Note  1237762:  Protec;on  against  password  hash  aacks   •  SAP  Note  1300104:  CUA  –  New  password  hash  procedures  -­‐  Background  informa;on   •  SAP  Note  1458262:  Recommended  se|ngs  for  password  hash  algorithms   •  SAP  Note  1484692:  Protect  read  access  to  password  hash  value  tables   •  SAP  Note  1488159:  SUIM  –  RSUSR003  –  Incorrect  results  for  CODVN  =  F   23  
  • 24. Passwords  from  RFC  request   24  
  • 25. Passwords  from  RFC  request   •  If  an  aacker  catches  an  RFC  request  with  logon  data,  he  will   be:   –  Happy  because  he  got  the  login  and  password   –  Upset  because  the  password  is  encrypted   –  Happy  because  the  encryp;on  is  just  a  XOR  (lol)   –  Happy  because  the  key  is  sta;c                                  Key: 313ec…a4021   –  Very  happy  because  he  got  the  clear  text  password     25  
  • 26. Passwords  from  RFC  request   26  
  • 27. Passwords  from  RFC  request   •  …and  the  PY  code  to  decrypt       key="313e…" def sxor(s1,s2): return ''.join(chr(ord(a) ^ ord(b)) for a,b in zip(s1,s2)) enc_pass="0108F357D03F770D" dec_pass=sxor(enc_pass.decode("hex"),key.decode("hex")) print "Decoded password is: "+dec_pass 27  
  • 28. Preven=on   •  Secure  RFC  connec;on  using    SNC   •  SAP  Security  Note  1724516   •  RFC  and  SNC:   hp://help.sap.com/saphelp_nw70ehp2/helpdata/en/72/ e52c4057cb185de10000000a1550b0/content.htm     28  
  • 29. 29   SAP  Visual  Admin  password  
  • 30. SAP  VisualAdmin   30   •  SAP  Visual  Admin  –  a  remote  tool  for  controlling  J2EE  Engine   •  Uses  the  P4  protocol  –  SAP’s  proprietary   •  By  default,  all  data  transmied  in  cleartext   •  P4  can  be  configured  to  use  SSL  to  prevent  MitM   •  Passwords  are  transmied  by  some  sort  of  encryp;on     •  In  reality,  it  is  some  sort  of  Base64  transforma;on  with  a  known   key          
  • 32. Insecure  password  encryp=on  in  P4   32   /* 87 */ char mask = 43690; //aaaa hex /* 88 */ char check = 21845; //5555 hex /* 89 */ char[] result = new char[data.length + 1]; /* */ /* 91 */ for (int i = 0; i < data.length; ++i) { /* 92 */ mask = (char)(mask ^ data[i]); /* 93 */ result[i] = mask; /* */ } /* 95 */ result[data.length] = (char)(mask ^ check); /* */ /* 97 */ return result;
  • 33. 33   DEMO   SAP  Visual  Admin  password  sniffing  
  • 34. Preven=on   •  Secure  P4  connec;on  using  SSL   •  SAP  Security  Note  1724516   •  Using  P4  protocol  over  a  secure  connec;on:   hp://help.sap.com/saphelp_nw73ehp1/helpdata/en/ 48/2d9ba88aef4bb9e10000000a42189b/content.htm   34  
  • 35. 35   SAP  JAVA  Security  Storage  
  • 36. SecStore   •  The  AS  Java  stores  security-­‐relevant  informa;on  encrypted  in  a   file  in  the  file  system   •  The  AS  Java  stores  the  following  security-­‐relevant  informa;on   in  files  in  the  file  system:   –   Database  user  SAP<SID>DB  and  its  password   –   Database  connec;on  informa;on   –   Administrator  user  and  its  password     •  Secure  storage  file  is  located  at  :   usrsap<SID>SYSglobalsecuritydataSecStore.properties           36  
  • 38. SecStore   •  Algorithm  is  TripleDES.  We  heed  a  key  for  decryp;on   •  The  main  issue  is  that  the  key  file  is  located  in  the  same   directory  as  the  encrypted  data:   usrsap<SID>SYSglobalsecuritydataSecStore.key       •  The  key  consists  of  two  parts:   –   Version  informa;on   –   Encrypted  key  phrase   38  
  • 39. SecStore   •   Version  informa;on.  It  affects  the  TripleDES  key   –     If  version  >=  7.00.000,  then  the  Triple  DES  key  =  key  phrase  +  <SID>   •   Encrypted  key  phrase     –   By  default,  it  is  the  ini;al  password  which  the  administrator  sets  up  during   SAP  system  installa;on.  Olen,  this  phase  equals  to  the  DB  password  or  an   SAP  administrator  account  password  (SAP*,  DDIC,  J2EE_Admin,  etc.)   –     For  encryp;ng  the  key  phrase,  XOR  algorithm  with  sta;c  key  is  used     43,-74…,-41,-67     •  That’s  why,  if  an  aacker  only  got  the  SecStore.key  file,  they  can   also  get  access  into  SAP,  because  they  have  the  ini;al  password   39  
  • 40. SecStore   •  OK.  We  have  the  encrypted  password  (SecStore.properXes)   •  We  have  the  decryp;on  key  (SecStore.key)   •  We  can  get  all  sensi;ve  informa;on  from  Security  Storage     •  As  I  said,  data’s  encrypted  by  the  TripleDES  algorithm   •  More  precisely,  the  encryp;on  uses  the  TripleDES  algorithm  in   CBC  mode  using  a  secret  key  which  is  derived  from  a  password   with  the  SHA  hash  algorithm   –   The  key  is  the  key  phrase  from  SecStore.key  +  <SID>  (if  version  >=   7.00.000)   –   The  salt  is  the  value  0000000000000000   40  
  • 41. SecStore   •  We  also  wrote  a  tool  which  decrypts  all  the  stuff  from  SAP  JAVA   AS  Security  Storage  (SecStore_Cr.jar)   •  Also,  SAP  Secure  Store  file  can  have  another  name  (ex.   JUpgrade.proper;es)  and  store  other  interes;ng  data,  like:   –   Password  for  SAP  OS  user  (SIDADM)   –   DB  password   –   DDIC  password   –   etc…   41  
  • 42. Preven=on   •   Install  SAP  Note  1619539   •   Restrict  read  access  to  files  SecStore.properXes,   JUpgrade.properXes,  and  SecStore.key   •   Managing  secure  storage  in  the  file  system:   hp://help.sap.com/saphelp_nw70ehp2/helpdata/en/cd/ 14c93ec2f7df6ae10000000a114084/content.htm   42  
  • 43. 43   Passwords  from  log  files  
  • 44. Log  files   •  We  know  about  many  places  where  SAP  writes  logs   •  Administrator  can  define  the  verbosity  level   •  Aacker  can  found  many  interes;ng  things  in  log  files:   informa;on  about  the  system,  informa;on  about  the  users,   even  session  informa;on   •  Very  interes;ng  path  with  logs:  /sapinst_instdir/         But    what  about  passwords?   44  
  • 45. Log  files   •  Passwords  in  SAP  log  files  looks  like  that:   dev_umconfigurator.trc 45  
  • 46. Log  files   •  Some;mes,  we  can  find  a  clear  text  password   sapinst_dev.<n>.log 46  
  • 47. Log  files   •  Some;mes,  we  can  find  an  encrypted  password   47  
  • 48. Log  files   •  Guess  what  type  of  encryp;on  is  used?  J   •  Right!  XOR  with  a  sta;c  hardcoded  key:   31…65d •  As  a  result,  we  have  a  decryptor:   key="31XXXXXXXXXXXX5d" def sxor(s1,s2): return ''.join(chr(ord(a) ^ ord(b)) for a,b in zip(s1,s2)) def prepare(val): encoco=val.split("|") rez="" for a in encoco: rez= rez + str(hex(int(a)).replace("0x","")) return rez encr=prepare(raw_input("Enter encrypted password:")) dec_pass=sxor(encr.decode("hex"),key.decode("hex")) print "Decoded password is: "+dec_pass 48  
  • 49. Log  files   •   The  same  story  with  the  config  file      usrsap<SID>configusagetypes.properXes   49  
  • 50. Preven=on   •  Don’t  use  TRACE_LEVEL  =  3   •  Delete  traces  when  work  is  finished   •  Mask  security-­‐sensi;ve  data  in  HTTP  access  log       •  Incremen;ng/decremen;ng  the  trace  level:   h p s : / / h e l p . s a p . c o m / s a p h e l p _ n w p i 7 1 / h e l p d a t a / e n / 46/962416a5a613e8e10000000a155369/content.htm   50  
  • 51. 51   Passwords  from  SLD  config  file  
  • 52. SLD   •  SLD  is  the  central  informa;on  repository  for  your  system   landscape   •  It  contains  informa;on  about:   –   technical  systems   –   landscapes   –   business  systems   –   products   –   solware  components  in  your  system  landscape   52  
  • 53. SLD  password  files   •     Configura;on  file:  usrsap<sid>DVEBMGS<nn>exe  slddest.cfg     –   User  name  with  DataSupplierLD  role   –   User  password  (wooot!)   –   Host  name   –   Port   Encrypted  by  DES  algorithm  in  the  early  version  of  SLD   Sta;c  default  key  is:  0A…71F But  if  user  specifies  the  key,  then  the  key  file  is  stored  near  the   encrypted  data  file  in  slddest.cfg.key   53  
  • 54. SLD  password  files   •  In  the  latest  versions  of  SLD,  another  algorithm  is  used:   TripleDES  with  hardcoded  key   54  
  • 55. Preven=on   •  Restrict  read  access  to  fileslddest.cfg  and  slddest.cfg.key   •  Configuring  sldreg  and  transferring  data  to  SLD:     hp://help.sap.com/saphelp_nw70/helpdata/en/42/ ea5ff4b5d61bd9e10000000a11466f/content.htm       55  
  • 56. 56   Passwords  from  ABAP  SecStore  
  • 57. Password  from  RSECTAB     •  The  secure  storage  is  a  component  of  the  SAP  Web  Applica;on   Server  ABAP   •  It  allows  the  encrypted  storage  of  sensi;ve  data  that  SAP   applica;ons  require  when  logging  into  other  systems   •  These  SAP  applica;ons  use  the  storage  to  store  passwords:   –  RFC  des;na;ons   –  Exchange  Infrastructure  (XI)   –  LDAP  system  users   –  SAPphone   –  SAPconnect   –  CCMS  (Generic  Request  and  Message  Generator)   •  Table  RSECTAB     select rawtohex(DATA) from SAPSR3.RSECTAB 57  
  • 60. Password  from  RSECTAB     •  TripleDES  3DES  mode:  DES-­‐EDE3   •  The  triple  DES  algorithm  uses  the  DES-­‐EDE3  method  where  a  24   byte  key  is  supplied.  This  means  there  are  three  DES  opera;ons   in  the  sequence  encrypt-­‐decrypt-­‐encrypt  with  the  three   different  keys.  The  first  key  will  be  bytes  1  to  8,  the  second  key   bytes  9  to  16  and  the  third  key  bytes  17  to  24   •  Two  rounds   60  
  • 61. Password  from  RSECTAB     •  First  round   •  Encrypt:     –   char  randomPrefix[2];   –   char  payload[109];     –   char  payloadLength;     –   char  magicLocal[4];     –   char  magicGlobalSalted[4];     –   char  recordIden;fierA7Hash[16];     61  
  • 62. Password  from  RSECTAB     •  Key  for  the  first  round  of  encryp;on  base  on  default  key:   Key’def[1] = Keydef[1] ^ (Hsup[0] & 0xF0) Key’def[6] = Keydef[6] ^ (Hsup[0] & 0x0F) Key’def[7] = Keydef[7] ^ (Hsup[3] & 0xF0) Key’def[10] = Keydef[10] ^ (Hsup[1] & 0xF0) Key’def[13] = Keydef[13] ^ (Hsup[1] & 0x0F) Key’def[16] = Keydef[16] ^ (Hsup[4] & 0x0F) Key’def[19] = Keydef[19] ^ (Hsup[2] & 0xF0) Key’def[20] = Keydef[20] ^ (Hsup[2] & 0x0F)   •  Where  Hsup  is  md5(sidA7[3]+insnoA7[10]) 62  
  • 64. Password  from  RSECTAB     •  Second  round   •  Encrypt  all  data  with  the  default  key     64  
  • 65. Password  from  RSECTAB     •  What  about  the  default  key?   •  It  is  encrypted  via  3DES-­‐EDE2,  too   •  But  the  key  for  this  encryp;on  is  hardcoded   65  
  • 66. Preven=on   •  Change  the  default  key     •  SAP  Security  Note  1902611   •  Choosing  your  own  key:   hp://help.sap.com/saphelp_nw70ehp2/helpdata/en/e0/ f73d41945bdb2be10000000a1550b0/content.htm       66  
  • 67. 67   Passwords  from  DBCON  table  
  • 68. DBCON  table   •  SAP  has  a  connec;on  with  different  DBs   •  Administrator  can  manage  this  connec;on  via  the  transac;on   DBCO   •  All  DB  connec;ons  informa;on  is  stored  encrypted  in  the  table   DBCON  (Descrip;on  of  Database  Connec;ons)   68  
  • 69. DBCON  table   •   Encrypted  data  looks  like:     V01/0030ZctvSB67Wv1OuVLazse4ORik –   BASE64  +  DES   –   hardcoded  key:  59A…70E –   decrypted  data  includes  sta;c  salt:  BE HAPPY 69  
  • 70. Preven=on   •  Restrict  access  to  the  table  DBCON   •  Restrict  access  to  the  transac;on  DBCO   •  SAP  Security  Notes  1638280  and  1823566       70  
  • 72. SAP  HANA   •  User  details  (including  passwords)  stored  in  hdbuserstore   •  Located  in  the  /usr/sap/hdbclient  directory   •  About  hdbuserstore:   ‒  SSFS_HDB.DAT   ‒  with  user  data   ‒  with  keys     72  
  • 73. SAP  HANA   •  SSFS_HDB.DAT   •  Signature:  RSecSSFsData   •  Algorithm:  3DES   •  Default  key  is  the  same  as  in  the  ABAP  Security  Storage 73  
  • 74. SAP  HANA   •  SAP  HANA  –  in  memory  database   •  But  it  drops  some  data  into  FS   –  Backup   –  Savepoint     “The  SAP  HANA  database  holds  the  bulk  of  its  data  in  memory  for  maximum   performance,  but  it  sXll  uses  persistent  disk  storage  to  provide  a  fallback  in  case   of  failure.  Data  is  automaXcally  saved  from  memory  to  disk  at  regular   savepoints.  The  data  belonging  to  a  savepoint  represents  a  consistent  state  of   the  data  on  disk  and  remains  so  unXl  the  next  savepoint  operaXon  has   completed.  Aber  a  power  failure,  the  database  can  be  restarted  like  any  disk-­‐ based  database  and  returns  to  its  last  consistent  state,”      –  SAP  HANA  Security  Guide   74  
  • 75. SAP  HANA   •   “Data  volume  encrypXon  ensures  that  anyone  who  can  access   the  data  volumes  on  disk  using  operaXng  system  commands   cannot  see  the  actual  data.  If  data  volumes  are  encrypted,  all   pages  that  reside  in  the  data  area  on  disk  are  encrypted  using   the  AES-­‐256-­‐CBC  algorithm.”   •   “Aber  data  volume  encrypXon  has  been  enabled,  an  iniXal  page   key  is  automaXcally  generated.  Page  keys  are  never  readable  in   plain  text,  but  are  encrypted  themselves  using  a  dedicated   persistence  encrypXon  root  key.”   75  
  • 76. SAP  HANA    “SAP  HANA  uses  SAP  NetWeaver  SSFS  to  protect  the  root  encrypXon  keys  that   are  used  to  protect  all  encrypXon  keys  used  in  the  SAP  HANA  system  from   unauthorized  access.”   •  SSFS_HDB.DAT   –   HDB_SERVER/PERSISTENCE/ROOTKEY   –   HDB_SERVER/DPAPI   •  The  persistence  encryp;on  feature  does  not  encrypt  the   following  data:   –   Database  redo  log  files   –   Database  backups   –   Database  traces   76  
  • 77. Preven=on   •  Change  the  encryp;on  key  aler  installa;on   •  Restrict  access  to  the  key  file   •  Restrict  access  to  the  DAT  file   •  Security  guide  for  HANA  (p.  71)   h&p://help.sap.com/hana/SAP_HANA_Security_Guide_en.pdf   •  Secure  storage  in  the  file  system:   h&p://help.sap.com/saphelp_nw70ehp2/helpdata/en/ a0/82dd0abbde4696b98a8be133b27f3b/content.htm     77  
  • 78. Etc..   •   ICF  Password  Repository   –  ICFSECPASSWD   •   FI  module  passwords   –  FIEB_PASSWORD   •   Oracle  Fail  Safe   –  Stores  passwords  inside  the  ENVIRONMENT  variable  (Note  1764043  p.  4)   •   SAP  BusinessObjects  LCMuser  –  hardcoded  SVN  user   –  SAP  BusinessObjects  Enterprise  XI.0LCM_repositorysvn_repository conf   •   SAP  BusinessObjects  axis2  login:password   –  axis2.xml     78  
  • 79. It  is  possible  to  protect  yourself  from  these  kinds  of  issues,     and  we  are  working  close  with  SAP  to  keep  customers  secure   SAP  guides   It’s  all  in  your  hands   Regular  security  assessments   ABAP  code  review   Monitoring  technical  security   Segrega=on  of  du=es   79   Conclusion  
  • 80.  I'd  like  to  thank  SAP's  Product  Security  Response  Team  for  the   great  cooperaXon  to  make  SAP  systems  more  secure.  Research   is  always  ongoing,  and  we  can't  share  all  of  it  today.  If  you  want   to   be   the   first   to   see   new   a&acks   and   demos,   follow   us   at   @erpscan  and  a&end  future  presentaXons.     PS:   •  EAS-­‐SEC:  Recourse  which  combines     –  Guidelines  for  assessing  enterprise  applica;on  security   –  Guidelines  for  assessing  custom  code   –  Surveys  about  enterprise  applica;on  security   80   Future  work