SlideShare a Scribd company logo
A short introduction to SAP Security Research
I found SAP vulnerabilities and all I got is this T-shirt of pretty decent quality
Agenda
SAP Security Research
Introduction
What is it?
Why do it?
How to do it?
Some examples of found vulnerabilities
Key takeaways
Introduction
#whoami
Introduction
Introduction
(SAP) Security in the news  on the rise
Introduction
Many Security-sessions @ Teched && d-code nowadays
Introduction
Why SAP, why Now?
As presented at the SAP Teched 2014 by Yonko Yonchev (Product Security Response
Team – SAP SE):
• SAP is globally 3rd largest software company
• SAP handles 74% of the world’s financial transactions
• Majority of Fortune 500 companies run SAP
• SAP Ariba connects more than 1 million companies in 190 countries
Source: SAP Teched 2014 Session ITM114 - ITM114 – Post Heartbleed: Secure your SAP Systems and Business Secrets from Hackers!
http://events.sap.com/teched/en/session/13526
Introduction
SAP Product Security Response
Source: SAP Teched 2014 Session ITM114 - ITM114 – Post Heartbleed: Secure your SAP Systems and Business Secrets from Hackers!
As presented at the SAP Teched 2014 by Yonko Yonchev (Product Security Response Team – SAP SE):
http://events.sap.com/teched/en/session/13526
SAP internal process and external service to support high security levels at SAP
customers’ systems with:
• Responsible disclosures of identified vulnerabilities in collaboration with leading
external SAP Security researchers and hackers
• Managing the end-to-end SAP process for fixing and disclosing externally known /
reported vulnerabilities
• Deliver SAP Security notes in the monthly patch day
• Supply internal SAP development with best practices on security issue prioritization
and security correction disclosure
Introduction
SAP Security notes over the years
• Percentage of
externally reported
vulnerabilities are on
the rise
• Total number of
monthly SAP Security
notes are decreasing
• Number of external
researches is
increasing
Source: SAP Teched 2014 Session ITM114 - ITM114 – Post Heartbleed: Secure your SAP Systems and Business Secrets from Hackers!
As presented at the SAP Teched 2014 by Yonko Yonchev (Product Security Response Team – SAP SE):
http://events.sap.com/teched/en/session/13526
Introduction
SAP Security researchers, some statistics
Source: http://scn.sap.com/blogs/securesap/2013/04/02/statistics-tell-sap-security-know-how-is-a-scarce-resource
• There are worldwide ~100 external SAP Security researchers that
reported over 450 vulnerabilities so far
• 80% of those reported vulnerabilities in SAP products originate
from only 7 companies
• 80% of all reported vulnerabilities in SAP products originate from
only 23 researchers
• 50% of those reported vulnerabilities in SAP products originate
from only 8 researchers
What is it....?
SAP Security research
How to do SAP Security research?
SAP Security research
• Manually
• Tools; Scanners, Fuzzers, Debuggers, Decompilers, Indexers, etc, etc…
• By using SAP differently (hacker mindset)
• Actually RTFM ;-)
• Unlimited possibilities; hardware, software, network, protocols, Database, Operating
System, application layer, frontend, ABAP, JAVA, agents, etc, etc…
What if you find a vulnerability?
SAP Security research
• Report it to SAP via responsible disclosure
• Give SAP the details
• Give SAP time to fix the issue
• Give customers a grace period of at least 3 months to apply the patch
Why do it....?
SAP Security Research
• To improve security of SAP systems
• Learn more about the inner working of SAP
• Because it is challenging and FUN
• It might bring you eternal fame and/or a T-shirt
Example 1; combination of vulnerabilities to completely
compromise a SAP system
Found vulnerabilities…
1. A default password for user SMDAGENT_<SID> in Solution Manager
2. Remote enabled function module /SDF/GEN_PROXY that acts like a wrapper
3. Remote enabled function module /SDF/RBE_NATSQL_SELECT that lacks
authorization checks and lets you execute native SQL commands
Use the above to select password hashes from table USR02 and bruteforce these.
Example 1; combination of vulnerabilities to completely
compromise a SAP system
Found vulnerabilities…
• Change password of user
SMDAGENT_<SID>
• Apply OSS note 1774432
(CVSS score 4.6)
• Apply OSS note 1727914
(CVSS score 7.5)
SOLUTION:
Example 2; Operating System Command Injection
Found vulnerabilities…
• Function Module EXE_SAPOSCOL can be used to inject Operating system commands
Use this for example to gain direct access to the database, stop SAP systems, create
operating users, etc, etc.
Found vulnerabilities…
• Apply OSS note 1577513
(CVSS score 5.5)
SOLUTION:
Example 2; Operating System Command Injection
Example 3; SQL Injection
Found vulnerabilities…
• RFC module RFC_RSUPG_EXEC can be used to inject SQL commands
Use this to gain direct access to the database.
Found vulnerabilities…
• Apply OSS note 1831463
(CVSS score 4.9)
SOLUTION:
Example 3; SQL Injection
Key Take-aways
Key Take-aways
• Secure your SAP systems by applying SAP Security notes on a regular
basis!
• If you find a bug/flaw that might have security impact; report it to the
SAP Security team (secure@sap.com)
• If you have some spare time, a SAP system (NOT IN PRD), permission
and feel like hacking… Go try and find some vulnerabilities yourself ;-)
Website: www.erp-sec.com
Twitter: @jvis @erpsec
Need more info? Contact us...
Questions?
Thank you
SAP, R/3, ABAP, SAP GUI, SAP NetWeaver and other SAP products and services mentioned herein as
well as their respective logos are trademarks or registered trademarks of SAP AG in Germany and
other countries.
All other product and service names mentioned are the trademarks of their respective companies.
Data contained in this document serves informational purposes only.
The authors assume no responsibility for errors or omissions in this document. The authors do not
warrant the accuracy or completeness of the information, text, graphics, links, or other items
contained within this material. This document is provided without a warranty of any kind, either
express or implied, including but not limited to the implied warranties of merchantability, fitness for a
particular purpose, or non-infringement.
The authors shall have no liability for damages of any kind including without limitation direct, special,
indirect, or consequential damages that may result from the use of this document.
SAP AG is neither the author nor the publisher of this publication and is not responsible for its
content, and SAP Group shall not be liable for errors or omissions with respect to the materials.
No part of this document may be reproduced without the prior written permission of ERP Security BV.
© 2013 ERP Security BV.
Disclaimer
Short introduction to SAP security research (sitNL)

More Related Content

What's hot

Fiori and S/4 authorizations: What are the biggest challenges, and where do t...
Fiori and S/4 authorizations: What are the biggest challenges, and where do t...Fiori and S/4 authorizations: What are the biggest challenges, and where do t...
Fiori and S/4 authorizations: What are the biggest challenges, and where do t...
akquinet enterprise solutions GmbH
 
Anil kumar sap security & GRC
Anil kumar sap security & GRCAnil kumar sap security & GRC
Anil kumar sap security & GRC
Anil Kumar
 
Iia los angeles sap security presentation
Iia  los angeles  sap security presentation Iia  los angeles  sap security presentation
Iia los angeles sap security presentation
hkodali
 
Sap grc process control 10.0
Sap grc process control 10.0Sap grc process control 10.0
Sap grc process control 10.0
Latha Kamal
 
Dell Quest TPAM Privileged Access Control
Dell Quest TPAM Privileged Access ControlDell Quest TPAM Privileged Access Control
Dell Quest TPAM Privileged Access Control
Aidy Tificate
 
Dell Password Manager Architecture - Components
Dell Password Manager Architecture - ComponentsDell Password Manager Architecture - Components
Dell Password Manager Architecture - Components
Aidy Tificate
 
e-DMZ Products Overview
e-DMZ Products Overviewe-DMZ Products Overview
e-DMZ Products Overview
Dell
 
OS Security Hardening for SAP HANA
OS Security Hardening for SAP HANAOS Security Hardening for SAP HANA
OS Security Hardening for SAP HANA
Dirk Oppenkowski
 
10 Steps to Better Windows Privileged Access Management
10 Steps to Better Windows Privileged Access Management10 Steps to Better Windows Privileged Access Management
10 Steps to Better Windows Privileged Access Management
BeyondTrust
 
Tips for the secure conversion of your SAP ERP roles to S/4HANA. [Webinar]
Tips for the secure conversion of your SAP ERP roles to S/4HANA. [Webinar]Tips for the secure conversion of your SAP ERP roles to S/4HANA. [Webinar]
Tips for the secure conversion of your SAP ERP roles to S/4HANA. [Webinar]
akquinet enterprise solutions GmbH
 
Sweden dst tpam 2014
Sweden dst tpam 2014Sweden dst tpam 2014
Sweden dst tpam 2014
Ronny Stavem
 
Securing DevOps through Privileged Access Management
Securing DevOps through Privileged Access ManagementSecuring DevOps through Privileged Access Management
Securing DevOps through Privileged Access Management
BeyondTrust
 
ERP Security. Myths, Problems, Solutions
ERP Security. Myths, Problems, SolutionsERP Security. Myths, Problems, Solutions
ERP Security. Myths, Problems, Solutions
ERPScan
 
Security Exploit of Business Logic Flaws, Business Logic Attacks
Security Exploit of Business Logic Flaws, Business Logic AttacksSecurity Exploit of Business Logic Flaws, Business Logic Attacks
Security Exploit of Business Logic Flaws, Business Logic Attacks
Marco Morana
 
Develop Stable, High-Performance Applications for SAP HANA
Develop Stable, High-Performance Applications for SAP HANADevelop Stable, High-Performance Applications for SAP HANA
Develop Stable, High-Performance Applications for SAP HANA
Virtual Forge
 
Defying Logic - Business Logic Testing with Automation
Defying Logic - Business Logic Testing with AutomationDefying Logic - Business Logic Testing with Automation
Defying Logic - Business Logic Testing with Automation
Rafal Los
 
Anil kumar sap security and grc consultant
Anil kumar sap security and grc consultantAnil kumar sap security and grc consultant
Anil kumar sap security and grc consultant
Anil Kumar
 
Anil kumar sap security and grc consultant
Anil kumar sap security and grc consultantAnil kumar sap security and grc consultant
Anil kumar sap security and grc consultant
Anil Kumar
 

What's hot (20)

Fiori and S/4 authorizations: What are the biggest challenges, and where do t...
Fiori and S/4 authorizations: What are the biggest challenges, and where do t...Fiori and S/4 authorizations: What are the biggest challenges, and where do t...
Fiori and S/4 authorizations: What are the biggest challenges, and where do t...
 
How to perform critical authorizations and so d checks in sap systems
How to perform critical authorizations and so d checks in sap systemsHow to perform critical authorizations and so d checks in sap systems
How to perform critical authorizations and so d checks in sap systems
 
Anil kumar sap security & GRC
Anil kumar sap security & GRCAnil kumar sap security & GRC
Anil kumar sap security & GRC
 
Iia los angeles sap security presentation
Iia  los angeles  sap security presentation Iia  los angeles  sap security presentation
Iia los angeles sap security presentation
 
Sap grc process control 10.0
Sap grc process control 10.0Sap grc process control 10.0
Sap grc process control 10.0
 
Dell Quest TPAM Privileged Access Control
Dell Quest TPAM Privileged Access ControlDell Quest TPAM Privileged Access Control
Dell Quest TPAM Privileged Access Control
 
Dell Password Manager Architecture - Components
Dell Password Manager Architecture - ComponentsDell Password Manager Architecture - Components
Dell Password Manager Architecture - Components
 
e-DMZ Products Overview
e-DMZ Products Overviewe-DMZ Products Overview
e-DMZ Products Overview
 
OS Security Hardening for SAP HANA
OS Security Hardening for SAP HANAOS Security Hardening for SAP HANA
OS Security Hardening for SAP HANA
 
10 Steps to Better Windows Privileged Access Management
10 Steps to Better Windows Privileged Access Management10 Steps to Better Windows Privileged Access Management
10 Steps to Better Windows Privileged Access Management
 
Tips for the secure conversion of your SAP ERP roles to S/4HANA. [Webinar]
Tips for the secure conversion of your SAP ERP roles to S/4HANA. [Webinar]Tips for the secure conversion of your SAP ERP roles to S/4HANA. [Webinar]
Tips for the secure conversion of your SAP ERP roles to S/4HANA. [Webinar]
 
Sweden dst tpam 2014
Sweden dst tpam 2014Sweden dst tpam 2014
Sweden dst tpam 2014
 
Securing DevOps through Privileged Access Management
Securing DevOps through Privileged Access ManagementSecuring DevOps through Privileged Access Management
Securing DevOps through Privileged Access Management
 
ERP Security. Myths, Problems, Solutions
ERP Security. Myths, Problems, SolutionsERP Security. Myths, Problems, Solutions
ERP Security. Myths, Problems, Solutions
 
Security Exploit of Business Logic Flaws, Business Logic Attacks
Security Exploit of Business Logic Flaws, Business Logic AttacksSecurity Exploit of Business Logic Flaws, Business Logic Attacks
Security Exploit of Business Logic Flaws, Business Logic Attacks
 
Develop Stable, High-Performance Applications for SAP HANA
Develop Stable, High-Performance Applications for SAP HANADevelop Stable, High-Performance Applications for SAP HANA
Develop Stable, High-Performance Applications for SAP HANA
 
Defying Logic - Business Logic Testing with Automation
Defying Logic - Business Logic Testing with AutomationDefying Logic - Business Logic Testing with Automation
Defying Logic - Business Logic Testing with Automation
 
Null Meet Ppt
Null Meet PptNull Meet Ppt
Null Meet Ppt
 
Anil kumar sap security and grc consultant
Anil kumar sap security and grc consultantAnil kumar sap security and grc consultant
Anil kumar sap security and grc consultant
 
Anil kumar sap security and grc consultant
Anil kumar sap security and grc consultantAnil kumar sap security and grc consultant
Anil kumar sap security and grc consultant
 

Viewers also liked

Agriculture super absorbent polymer - potassium polyacrylate
Agriculture super absorbent polymer - potassium polyacrylateAgriculture super absorbent polymer - potassium polyacrylate
Agriculture super absorbent polymer - potassium polyacrylate
Simon Dou
 
Peter Whitehead Projects 2
Peter Whitehead Projects 2Peter Whitehead Projects 2
Peter Whitehead Projects 2peterwhitehead
 
Adel Cooper And Friends Part 1
Adel Cooper And Friends Part 1Adel Cooper And Friends Part 1
Adel Cooper And Friends Part 1
john dorman
 
Sns Game Marketing
Sns Game MarketingSns Game Marketing
A&M
A&MA&M
sitNL 2014 welcome
sitNL 2014 welcome sitNL 2014 welcome
sitNL 2014 welcome
Twan van den Broek
 
The Adventures of Specialist John Dorman
The Adventures of Specialist John DormanThe Adventures of Specialist John Dorman
The Adventures of Specialist John Dorman
john dorman
 
Personal Online Branding
Personal Online BrandingPersonal Online Branding
Personal Online Branding
Dennis van Steijn
 
视觉隐藏内容
视觉隐藏内容视觉隐藏内容
视觉隐藏内容Jace Lee
 
How To Motivate and Retain Knowledge Workers
How To Motivate and Retain Knowledge WorkersHow To Motivate and Retain Knowledge Workers
How To Motivate and Retain Knowledge Workers
kcarleton
 
Alternative input methods in Fiori | sitNL 2016
Alternative input methods in Fiori | sitNL 2016Alternative input methods in Fiori | sitNL 2016
Alternative input methods in Fiori | sitNL 2016
Twan van den Broek
 
Femeie Vs Barbat Bundy Style
Femeie Vs Barbat  Bundy StyleFemeie Vs Barbat  Bundy Style
Femeie Vs Barbat Bundy StyleLaura Popescu
 
Cd100 latest updates
Cd100 latest updatesCd100 latest updates
Cd100 latest updates
Twan van den Broek
 
Our Wedding Presentation
Our Wedding PresentationOur Wedding Presentation
Our Wedding Presentationjohn dorman
 
Dia 030409 Presentation.Ppt
Dia 030409 Presentation.PptDia 030409 Presentation.Ppt
Dia 030409 Presentation.Pptarshaluis
 
Sph Colloquim March 9
Sph Colloquim March 9Sph Colloquim March 9
Sph Colloquim March 9
Alberta Health Services
 
HOS
HOS HOS
HOS
wilsonrdb
 

Viewers also liked (20)

Agriculture super absorbent polymer - potassium polyacrylate
Agriculture super absorbent polymer - potassium polyacrylateAgriculture super absorbent polymer - potassium polyacrylate
Agriculture super absorbent polymer - potassium polyacrylate
 
Peter Whitehead Projects 2
Peter Whitehead Projects 2Peter Whitehead Projects 2
Peter Whitehead Projects 2
 
Logica Imbatranirii
Logica ImbatraniriiLogica Imbatranirii
Logica Imbatranirii
 
Adel Cooper And Friends Part 1
Adel Cooper And Friends Part 1Adel Cooper And Friends Part 1
Adel Cooper And Friends Part 1
 
Sns Game Marketing
Sns Game MarketingSns Game Marketing
Sns Game Marketing
 
A&M
A&MA&M
A&M
 
sitNL 2014 welcome
sitNL 2014 welcome sitNL 2014 welcome
sitNL 2014 welcome
 
The Adventures of Specialist John Dorman
The Adventures of Specialist John DormanThe Adventures of Specialist John Dorman
The Adventures of Specialist John Dorman
 
Personal Online Branding
Personal Online BrandingPersonal Online Branding
Personal Online Branding
 
视觉隐藏内容
视觉隐藏内容视觉隐藏内容
视觉隐藏内容
 
How To Motivate and Retain Knowledge Workers
How To Motivate and Retain Knowledge WorkersHow To Motivate and Retain Knowledge Workers
How To Motivate and Retain Knowledge Workers
 
Alternative input methods in Fiori | sitNL 2016
Alternative input methods in Fiori | sitNL 2016Alternative input methods in Fiori | sitNL 2016
Alternative input methods in Fiori | sitNL 2016
 
Femeie Vs Barbat Bundy Style
Femeie Vs Barbat  Bundy StyleFemeie Vs Barbat  Bundy Style
Femeie Vs Barbat Bundy Style
 
Cd100 latest updates
Cd100 latest updatesCd100 latest updates
Cd100 latest updates
 
Our Wedding Presentation
Our Wedding PresentationOur Wedding Presentation
Our Wedding Presentation
 
My tux painting
My tux paintingMy tux painting
My tux painting
 
Dia 030409 Presentation.Ppt
Dia 030409 Presentation.PptDia 030409 Presentation.Ppt
Dia 030409 Presentation.Ppt
 
Game
GameGame
Game
 
Sph Colloquim March 9
Sph Colloquim March 9Sph Colloquim March 9
Sph Colloquim March 9
 
HOS
HOS HOS
HOS
 

Similar to Short introduction to SAP security research (sitNL)

Erp security joris-van_de_vis_sap_security_sitnl_2015_v0.2
Erp security joris-van_de_vis_sap_security_sitnl_2015_v0.2Erp security joris-van_de_vis_sap_security_sitnl_2015_v0.2
Erp security joris-van_de_vis_sap_security_sitnl_2015_v0.2
jvandevis
 
The importance of applying SAP patches (Joris van de Vis)
The importance of applying SAP patches (Joris van de Vis)The importance of applying SAP patches (Joris van de Vis)
The importance of applying SAP patches (Joris van de Vis)
Twan van den Broek
 
SAP inside track NL 2013, SAP Security update
SAP inside track NL 2013, SAP Security updateSAP inside track NL 2013, SAP Security update
SAP inside track NL 2013, SAP Security update
jvandevis
 
sitNL Security Update from SAP TechEd 2013
sitNL Security Update from SAP TechEd 2013sitNL Security Update from SAP TechEd 2013
sitNL Security Update from SAP TechEd 2013
Twan van den Broek
 
Incident Response and SAP Systems
Incident Response and SAP SystemsIncident Response and SAP Systems
Incident Response and SAP SystemsOnapsis Inc.
 
So You Think You Can Hack | sitNL 2016
So You Think You Can Hack | sitNL 2016So You Think You Can Hack | sitNL 2016
So You Think You Can Hack | sitNL 2016
Twan van den Broek
 
Deploying Static Application Security Testing on a Large Scale
Deploying Static Application Security Testing on a Large ScaleDeploying Static Application Security Testing on a Large Scale
Deploying Static Application Security Testing on a Large Scale
Achim D. Brucker
 
An easy way into your sap systems v3.0
An easy way into your sap systems v3.0An easy way into your sap systems v3.0
An easy way into your sap systems v3.0
Cyber Security Alliance
 
SAP Inside Track Frankfurt 2018 #Sitfra 2018
SAP Inside Track Frankfurt 2018 #Sitfra 2018SAP Inside Track Frankfurt 2018 #Sitfra 2018
SAP Inside Track Frankfurt 2018 #Sitfra 2018
jvandevis
 
Industrial Challenges of Secure Software Development
Industrial Challenges of Secure Software DevelopmentIndustrial Challenges of Secure Software Development
Industrial Challenges of Secure Software Development
Achim D. Brucker
 
Attacks Based on Security Configurations
Attacks Based on Security ConfigurationsAttacks Based on Security Configurations
Attacks Based on Security Configurations
Onapsis Inc.
 
SAST Code Security Advisor for SAP [Webinar]
SAST Code Security Advisor for SAP [Webinar]SAST Code Security Advisor for SAP [Webinar]
SAST Code Security Advisor for SAP [Webinar]
akquinet enterprise solutions GmbH
 
SAP Enterprise Threat Detection Overview
SAP Enterprise Threat Detection OverviewSAP Enterprise Threat Detection Overview
SAP Enterprise Threat Detection Overview
SAP Technology
 
DeltaGRiC_Consulting_SMAC_Digital Innovation Security Conference_Presentation...
DeltaGRiC_Consulting_SMAC_Digital Innovation Security Conference_Presentation...DeltaGRiC_Consulting_SMAC_Digital Innovation Security Conference_Presentation...
DeltaGRiC_Consulting_SMAC_Digital Innovation Security Conference_Presentation...Tunde Ogunkoya
 
SAST for JavaScript: A Brief Overview of Commercial Tools
SAST for JavaScript: A Brief Overview of Commercial ToolsSAST for JavaScript: A Brief Overview of Commercial Tools
SAST for JavaScript: A Brief Overview of Commercial Tools
Achim D. Brucker
 
Penetration Testing SAP Systems
Penetration Testing SAP SystemsPenetration Testing SAP Systems
Penetration Testing SAP Systems
Onapsis Inc.
 
SAST Managed Services for SAP [Webinar]
SAST Managed Services for SAP [Webinar]SAST Managed Services for SAP [Webinar]
SAST Managed Services for SAP [Webinar]
akquinet enterprise solutions GmbH
 
Practical SAP pentesting (B-Sides San Paulo)
Practical SAP pentesting (B-Sides San Paulo)Practical SAP pentesting (B-Sides San Paulo)
Practical SAP pentesting (B-Sides San Paulo)
ERPScan
 
Practical SAP pentesting workshop (NullCon Goa)
Practical SAP pentesting workshop (NullCon Goa)Practical SAP pentesting workshop (NullCon Goa)
Practical SAP pentesting workshop (NullCon Goa)
ERPScan
 
Sap ha240 col10 - hana sp10 version latest sample
Sap ha240   col10 - hana sp10 version latest sampleSap ha240   col10 - hana sp10 version latest sample
Sap ha240 col10 - hana sp10 version latest sample
Sap Materials
 

Similar to Short introduction to SAP security research (sitNL) (20)

Erp security joris-van_de_vis_sap_security_sitnl_2015_v0.2
Erp security joris-van_de_vis_sap_security_sitnl_2015_v0.2Erp security joris-van_de_vis_sap_security_sitnl_2015_v0.2
Erp security joris-van_de_vis_sap_security_sitnl_2015_v0.2
 
The importance of applying SAP patches (Joris van de Vis)
The importance of applying SAP patches (Joris van de Vis)The importance of applying SAP patches (Joris van de Vis)
The importance of applying SAP patches (Joris van de Vis)
 
SAP inside track NL 2013, SAP Security update
SAP inside track NL 2013, SAP Security updateSAP inside track NL 2013, SAP Security update
SAP inside track NL 2013, SAP Security update
 
sitNL Security Update from SAP TechEd 2013
sitNL Security Update from SAP TechEd 2013sitNL Security Update from SAP TechEd 2013
sitNL Security Update from SAP TechEd 2013
 
Incident Response and SAP Systems
Incident Response and SAP SystemsIncident Response and SAP Systems
Incident Response and SAP Systems
 
So You Think You Can Hack | sitNL 2016
So You Think You Can Hack | sitNL 2016So You Think You Can Hack | sitNL 2016
So You Think You Can Hack | sitNL 2016
 
Deploying Static Application Security Testing on a Large Scale
Deploying Static Application Security Testing on a Large ScaleDeploying Static Application Security Testing on a Large Scale
Deploying Static Application Security Testing on a Large Scale
 
An easy way into your sap systems v3.0
An easy way into your sap systems v3.0An easy way into your sap systems v3.0
An easy way into your sap systems v3.0
 
SAP Inside Track Frankfurt 2018 #Sitfra 2018
SAP Inside Track Frankfurt 2018 #Sitfra 2018SAP Inside Track Frankfurt 2018 #Sitfra 2018
SAP Inside Track Frankfurt 2018 #Sitfra 2018
 
Industrial Challenges of Secure Software Development
Industrial Challenges of Secure Software DevelopmentIndustrial Challenges of Secure Software Development
Industrial Challenges of Secure Software Development
 
Attacks Based on Security Configurations
Attacks Based on Security ConfigurationsAttacks Based on Security Configurations
Attacks Based on Security Configurations
 
SAST Code Security Advisor for SAP [Webinar]
SAST Code Security Advisor for SAP [Webinar]SAST Code Security Advisor for SAP [Webinar]
SAST Code Security Advisor for SAP [Webinar]
 
SAP Enterprise Threat Detection Overview
SAP Enterprise Threat Detection OverviewSAP Enterprise Threat Detection Overview
SAP Enterprise Threat Detection Overview
 
DeltaGRiC_Consulting_SMAC_Digital Innovation Security Conference_Presentation...
DeltaGRiC_Consulting_SMAC_Digital Innovation Security Conference_Presentation...DeltaGRiC_Consulting_SMAC_Digital Innovation Security Conference_Presentation...
DeltaGRiC_Consulting_SMAC_Digital Innovation Security Conference_Presentation...
 
SAST for JavaScript: A Brief Overview of Commercial Tools
SAST for JavaScript: A Brief Overview of Commercial ToolsSAST for JavaScript: A Brief Overview of Commercial Tools
SAST for JavaScript: A Brief Overview of Commercial Tools
 
Penetration Testing SAP Systems
Penetration Testing SAP SystemsPenetration Testing SAP Systems
Penetration Testing SAP Systems
 
SAST Managed Services for SAP [Webinar]
SAST Managed Services for SAP [Webinar]SAST Managed Services for SAP [Webinar]
SAST Managed Services for SAP [Webinar]
 
Practical SAP pentesting (B-Sides San Paulo)
Practical SAP pentesting (B-Sides San Paulo)Practical SAP pentesting (B-Sides San Paulo)
Practical SAP pentesting (B-Sides San Paulo)
 
Practical SAP pentesting workshop (NullCon Goa)
Practical SAP pentesting workshop (NullCon Goa)Practical SAP pentesting workshop (NullCon Goa)
Practical SAP pentesting workshop (NullCon Goa)
 
Sap ha240 col10 - hana sp10 version latest sample
Sap ha240   col10 - hana sp10 version latest sampleSap ha240   col10 - hana sp10 version latest sample
Sap ha240 col10 - hana sp10 version latest sample
 

More from Twan van den Broek

How SAP Leonardo is empowering animal wellbeing (Leon / Harmen)
How SAP Leonardo is empowering animal wellbeing (Leon / Harmen)How SAP Leonardo is empowering animal wellbeing (Leon / Harmen)
How SAP Leonardo is empowering animal wellbeing (Leon / Harmen)
Twan van den Broek
 
Can you keep up with SAP Analytics Cloud? (Martijn van Foeken)
Can you keep up with SAP Analytics Cloud? (Martijn van Foeken)Can you keep up with SAP Analytics Cloud? (Martijn van Foeken)
Can you keep up with SAP Analytics Cloud? (Martijn van Foeken)
Twan van den Broek
 
SAP Data Hub – What is it, and what’s new? (Sefan Linders)
SAP Data Hub – What is it, and what’s new? (Sefan Linders)SAP Data Hub – What is it, and what’s new? (Sefan Linders)
SAP Data Hub – What is it, and what’s new? (Sefan Linders)
Twan van den Broek
 
SAP HANA SQL Data Warehousing (Sefan Linders)
SAP HANA SQL Data Warehousing (Sefan Linders)SAP HANA SQL Data Warehousing (Sefan Linders)
SAP HANA SQL Data Warehousing (Sefan Linders)
Twan van den Broek
 
SAP analytics as enabler for the intelligent enterprise (Iver van de Zand)
SAP analytics as enabler for the intelligent enterprise (Iver van de Zand)SAP analytics as enabler for the intelligent enterprise (Iver van de Zand)
SAP analytics as enabler for the intelligent enterprise (Iver van de Zand)
Twan van den Broek
 
Beyond OData introducing the xmla model for ui5 (Roland Bouwman)
Beyond OData introducing the xmla model for ui5 (Roland Bouwman)Beyond OData introducing the xmla model for ui5 (Roland Bouwman)
Beyond OData introducing the xmla model for ui5 (Roland Bouwman)
Twan van den Broek
 
Integrating SAPUI5 with ArcGIS Maps (Leon van Ginneken)
Integrating SAPUI5 with ArcGIS Maps (Leon van Ginneken)Integrating SAPUI5 with ArcGIS Maps (Leon van Ginneken)
Integrating SAPUI5 with ArcGIS Maps (Leon van Ginneken)
Twan van den Broek
 
SQL Data Warehousing in SAP HANA (Sefan Linders)
SQL Data Warehousing in SAP HANA (Sefan Linders)SQL Data Warehousing in SAP HANA (Sefan Linders)
SQL Data Warehousing in SAP HANA (Sefan Linders)
Twan van den Broek
 
SAP Predictive Analytics (Nico van der Hoeven)
SAP Predictive Analytics (Nico van der Hoeven)SAP Predictive Analytics (Nico van der Hoeven)
SAP Predictive Analytics (Nico van der Hoeven)
Twan van den Broek
 
Blockchain for the Enterprise
Blockchain for the EnterpriseBlockchain for the Enterprise
Blockchain for the Enterprise
Twan van den Broek
 
DIR - A tribute to Standards and Guidelines... (Laurens van Rijn)
DIR - A tribute to Standards and Guidelines...  (Laurens van Rijn)DIR - A tribute to Standards and Guidelines...  (Laurens van Rijn)
DIR - A tribute to Standards and Guidelines... (Laurens van Rijn)
Twan van den Broek
 
Building an innovation culture - Powered by diversity
Building an innovation culture - Powered by diversityBuilding an innovation culture - Powered by diversity
Building an innovation culture - Powered by diversity
Twan van den Broek
 
SAP Leonardo / Machine Learning (Iver van de Zand)
SAP Leonardo / Machine Learning (Iver van de Zand)SAP Leonardo / Machine Learning (Iver van de Zand)
SAP Leonardo / Machine Learning (Iver van de Zand)
Twan van den Broek
 
SAP TechEd recap (Ronald Konijnenburg / Sven van Leuken)
SAP TechEd recap (Ronald Konijnenburg / Sven van Leuken)SAP TechEd recap (Ronald Konijnenburg / Sven van Leuken)
SAP TechEd recap (Ronald Konijnenburg / Sven van Leuken)
Twan van den Broek
 
Masterclass Mendix (Jan Penninkhof / Twan van den Broek)
Masterclass Mendix (Jan Penninkhof / Twan van den Broek)Masterclass Mendix (Jan Penninkhof / Twan van den Broek)
Masterclass Mendix (Jan Penninkhof / Twan van den Broek)
Twan van den Broek
 
Masterclass Machine Learning (Ronald Kleijn)
Masterclass Machine Learning (Ronald Kleijn)Masterclass Machine Learning (Ronald Kleijn)
Masterclass Machine Learning (Ronald Kleijn)
Twan van den Broek
 
SAP Run Live Truck - SAP Cloud Platform use cases
SAP Run Live Truck - SAP Cloud Platform use casesSAP Run Live Truck - SAP Cloud Platform use cases
SAP Run Live Truck - SAP Cloud Platform use cases
Twan van den Broek
 
Recap SAP Inside Track NL (sitNL)
Recap SAP Inside Track NL (sitNL)Recap SAP Inside Track NL (sitNL)
Recap SAP Inside Track NL (sitNL)
Twan van den Broek
 
Welcome at SAP Inside Track NL (sitNL)
Welcome at SAP Inside Track NL (sitNL)Welcome at SAP Inside Track NL (sitNL)
Welcome at SAP Inside Track NL (sitNL)
Twan van den Broek
 
Finding ABAP
Finding ABAPFinding ABAP
Finding ABAP
Twan van den Broek
 

More from Twan van den Broek (20)

How SAP Leonardo is empowering animal wellbeing (Leon / Harmen)
How SAP Leonardo is empowering animal wellbeing (Leon / Harmen)How SAP Leonardo is empowering animal wellbeing (Leon / Harmen)
How SAP Leonardo is empowering animal wellbeing (Leon / Harmen)
 
Can you keep up with SAP Analytics Cloud? (Martijn van Foeken)
Can you keep up with SAP Analytics Cloud? (Martijn van Foeken)Can you keep up with SAP Analytics Cloud? (Martijn van Foeken)
Can you keep up with SAP Analytics Cloud? (Martijn van Foeken)
 
SAP Data Hub – What is it, and what’s new? (Sefan Linders)
SAP Data Hub – What is it, and what’s new? (Sefan Linders)SAP Data Hub – What is it, and what’s new? (Sefan Linders)
SAP Data Hub – What is it, and what’s new? (Sefan Linders)
 
SAP HANA SQL Data Warehousing (Sefan Linders)
SAP HANA SQL Data Warehousing (Sefan Linders)SAP HANA SQL Data Warehousing (Sefan Linders)
SAP HANA SQL Data Warehousing (Sefan Linders)
 
SAP analytics as enabler for the intelligent enterprise (Iver van de Zand)
SAP analytics as enabler for the intelligent enterprise (Iver van de Zand)SAP analytics as enabler for the intelligent enterprise (Iver van de Zand)
SAP analytics as enabler for the intelligent enterprise (Iver van de Zand)
 
Beyond OData introducing the xmla model for ui5 (Roland Bouwman)
Beyond OData introducing the xmla model for ui5 (Roland Bouwman)Beyond OData introducing the xmla model for ui5 (Roland Bouwman)
Beyond OData introducing the xmla model for ui5 (Roland Bouwman)
 
Integrating SAPUI5 with ArcGIS Maps (Leon van Ginneken)
Integrating SAPUI5 with ArcGIS Maps (Leon van Ginneken)Integrating SAPUI5 with ArcGIS Maps (Leon van Ginneken)
Integrating SAPUI5 with ArcGIS Maps (Leon van Ginneken)
 
SQL Data Warehousing in SAP HANA (Sefan Linders)
SQL Data Warehousing in SAP HANA (Sefan Linders)SQL Data Warehousing in SAP HANA (Sefan Linders)
SQL Data Warehousing in SAP HANA (Sefan Linders)
 
SAP Predictive Analytics (Nico van der Hoeven)
SAP Predictive Analytics (Nico van der Hoeven)SAP Predictive Analytics (Nico van der Hoeven)
SAP Predictive Analytics (Nico van der Hoeven)
 
Blockchain for the Enterprise
Blockchain for the EnterpriseBlockchain for the Enterprise
Blockchain for the Enterprise
 
DIR - A tribute to Standards and Guidelines... (Laurens van Rijn)
DIR - A tribute to Standards and Guidelines...  (Laurens van Rijn)DIR - A tribute to Standards and Guidelines...  (Laurens van Rijn)
DIR - A tribute to Standards and Guidelines... (Laurens van Rijn)
 
Building an innovation culture - Powered by diversity
Building an innovation culture - Powered by diversityBuilding an innovation culture - Powered by diversity
Building an innovation culture - Powered by diversity
 
SAP Leonardo / Machine Learning (Iver van de Zand)
SAP Leonardo / Machine Learning (Iver van de Zand)SAP Leonardo / Machine Learning (Iver van de Zand)
SAP Leonardo / Machine Learning (Iver van de Zand)
 
SAP TechEd recap (Ronald Konijnenburg / Sven van Leuken)
SAP TechEd recap (Ronald Konijnenburg / Sven van Leuken)SAP TechEd recap (Ronald Konijnenburg / Sven van Leuken)
SAP TechEd recap (Ronald Konijnenburg / Sven van Leuken)
 
Masterclass Mendix (Jan Penninkhof / Twan van den Broek)
Masterclass Mendix (Jan Penninkhof / Twan van den Broek)Masterclass Mendix (Jan Penninkhof / Twan van den Broek)
Masterclass Mendix (Jan Penninkhof / Twan van den Broek)
 
Masterclass Machine Learning (Ronald Kleijn)
Masterclass Machine Learning (Ronald Kleijn)Masterclass Machine Learning (Ronald Kleijn)
Masterclass Machine Learning (Ronald Kleijn)
 
SAP Run Live Truck - SAP Cloud Platform use cases
SAP Run Live Truck - SAP Cloud Platform use casesSAP Run Live Truck - SAP Cloud Platform use cases
SAP Run Live Truck - SAP Cloud Platform use cases
 
Recap SAP Inside Track NL (sitNL)
Recap SAP Inside Track NL (sitNL)Recap SAP Inside Track NL (sitNL)
Recap SAP Inside Track NL (sitNL)
 
Welcome at SAP Inside Track NL (sitNL)
Welcome at SAP Inside Track NL (sitNL)Welcome at SAP Inside Track NL (sitNL)
Welcome at SAP Inside Track NL (sitNL)
 
Finding ABAP
Finding ABAPFinding ABAP
Finding ABAP
 

Recently uploaded

RMD24 | Debunking the non-endemic revenue myth Marvin Vacquier Droop | First ...
RMD24 | Debunking the non-endemic revenue myth Marvin Vacquier Droop | First ...RMD24 | Debunking the non-endemic revenue myth Marvin Vacquier Droop | First ...
RMD24 | Debunking the non-endemic revenue myth Marvin Vacquier Droop | First ...
BBPMedia1
 
Enterprise Excellence is Inclusive Excellence.pdf
Enterprise Excellence is Inclusive Excellence.pdfEnterprise Excellence is Inclusive Excellence.pdf
Enterprise Excellence is Inclusive Excellence.pdf
KaiNexus
 
Introduction to Amazon company 111111111111
Introduction to Amazon company 111111111111Introduction to Amazon company 111111111111
Introduction to Amazon company 111111111111
zoyaansari11365
 
ENTREPRENEURSHIP TRAINING.ppt for graduating class (1).ppt
ENTREPRENEURSHIP TRAINING.ppt for graduating class (1).pptENTREPRENEURSHIP TRAINING.ppt for graduating class (1).ppt
ENTREPRENEURSHIP TRAINING.ppt for graduating class (1).ppt
zechu97
 
LA HUG - Video Testimonials with Chynna Morgan - June 2024
LA HUG - Video Testimonials with Chynna Morgan - June 2024LA HUG - Video Testimonials with Chynna Morgan - June 2024
LA HUG - Video Testimonials with Chynna Morgan - June 2024
Lital Barkan
 
anas about venice for grade 6f about venice
anas about venice for grade 6f about veniceanas about venice for grade 6f about venice
anas about venice for grade 6f about venice
anasabutalha2013
 
Discover the innovative and creative projects that highlight my journey throu...
Discover the innovative and creative projects that highlight my journey throu...Discover the innovative and creative projects that highlight my journey throu...
Discover the innovative and creative projects that highlight my journey throu...
dylandmeas
 
amptalk_RecruitingDeck_english_2024.06.05
amptalk_RecruitingDeck_english_2024.06.05amptalk_RecruitingDeck_english_2024.06.05
amptalk_RecruitingDeck_english_2024.06.05
marketing317746
 
Digital Transformation and IT Strategy Toolkit and Templates
Digital Transformation and IT Strategy Toolkit and TemplatesDigital Transformation and IT Strategy Toolkit and Templates
Digital Transformation and IT Strategy Toolkit and Templates
Aurelien Domont, MBA
 
Project File Report BBA 6th semester.pdf
Project File Report BBA 6th semester.pdfProject File Report BBA 6th semester.pdf
Project File Report BBA 6th semester.pdf
RajPriye
 
Premium MEAN Stack Development Solutions for Modern Businesses
Premium MEAN Stack Development Solutions for Modern BusinessesPremium MEAN Stack Development Solutions for Modern Businesses
Premium MEAN Stack Development Solutions for Modern Businesses
SynapseIndia
 
Business Valuation Principles for Entrepreneurs
Business Valuation Principles for EntrepreneursBusiness Valuation Principles for Entrepreneurs
Business Valuation Principles for Entrepreneurs
Ben Wann
 
FINAL PRESENTATION.pptx12143241324134134
FINAL PRESENTATION.pptx12143241324134134FINAL PRESENTATION.pptx12143241324134134
FINAL PRESENTATION.pptx12143241324134134
LR1709MUSIC
 
Attending a job Interview for B1 and B2 Englsih learners
Attending a job Interview for B1 and B2 Englsih learnersAttending a job Interview for B1 and B2 Englsih learners
Attending a job Interview for B1 and B2 Englsih learners
Erika906060
 
falcon-invoice-discounting-a-premier-platform-for-investors-in-india
falcon-invoice-discounting-a-premier-platform-for-investors-in-indiafalcon-invoice-discounting-a-premier-platform-for-investors-in-india
falcon-invoice-discounting-a-premier-platform-for-investors-in-india
Falcon Invoice Discounting
 
一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理
一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理
一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理
taqyed
 
The-McKinsey-7S-Framework. strategic management
The-McKinsey-7S-Framework. strategic managementThe-McKinsey-7S-Framework. strategic management
The-McKinsey-7S-Framework. strategic management
Bojamma2
 
Brand Analysis for an artist named Struan
Brand Analysis for an artist named StruanBrand Analysis for an artist named Struan
Brand Analysis for an artist named Struan
sarahvanessa51503
 
Skye Residences | Extended Stay Residences Near Toronto Airport
Skye Residences | Extended Stay Residences Near Toronto AirportSkye Residences | Extended Stay Residences Near Toronto Airport
Skye Residences | Extended Stay Residences Near Toronto Airport
marketingjdass
 
ModelingMarketingStrategiesMKS.CollumbiaUniversitypdf
ModelingMarketingStrategiesMKS.CollumbiaUniversitypdfModelingMarketingStrategiesMKS.CollumbiaUniversitypdf
ModelingMarketingStrategiesMKS.CollumbiaUniversitypdf
fisherameliaisabella
 

Recently uploaded (20)

RMD24 | Debunking the non-endemic revenue myth Marvin Vacquier Droop | First ...
RMD24 | Debunking the non-endemic revenue myth Marvin Vacquier Droop | First ...RMD24 | Debunking the non-endemic revenue myth Marvin Vacquier Droop | First ...
RMD24 | Debunking the non-endemic revenue myth Marvin Vacquier Droop | First ...
 
Enterprise Excellence is Inclusive Excellence.pdf
Enterprise Excellence is Inclusive Excellence.pdfEnterprise Excellence is Inclusive Excellence.pdf
Enterprise Excellence is Inclusive Excellence.pdf
 
Introduction to Amazon company 111111111111
Introduction to Amazon company 111111111111Introduction to Amazon company 111111111111
Introduction to Amazon company 111111111111
 
ENTREPRENEURSHIP TRAINING.ppt for graduating class (1).ppt
ENTREPRENEURSHIP TRAINING.ppt for graduating class (1).pptENTREPRENEURSHIP TRAINING.ppt for graduating class (1).ppt
ENTREPRENEURSHIP TRAINING.ppt for graduating class (1).ppt
 
LA HUG - Video Testimonials with Chynna Morgan - June 2024
LA HUG - Video Testimonials with Chynna Morgan - June 2024LA HUG - Video Testimonials with Chynna Morgan - June 2024
LA HUG - Video Testimonials with Chynna Morgan - June 2024
 
anas about venice for grade 6f about venice
anas about venice for grade 6f about veniceanas about venice for grade 6f about venice
anas about venice for grade 6f about venice
 
Discover the innovative and creative projects that highlight my journey throu...
Discover the innovative and creative projects that highlight my journey throu...Discover the innovative and creative projects that highlight my journey throu...
Discover the innovative and creative projects that highlight my journey throu...
 
amptalk_RecruitingDeck_english_2024.06.05
amptalk_RecruitingDeck_english_2024.06.05amptalk_RecruitingDeck_english_2024.06.05
amptalk_RecruitingDeck_english_2024.06.05
 
Digital Transformation and IT Strategy Toolkit and Templates
Digital Transformation and IT Strategy Toolkit and TemplatesDigital Transformation and IT Strategy Toolkit and Templates
Digital Transformation and IT Strategy Toolkit and Templates
 
Project File Report BBA 6th semester.pdf
Project File Report BBA 6th semester.pdfProject File Report BBA 6th semester.pdf
Project File Report BBA 6th semester.pdf
 
Premium MEAN Stack Development Solutions for Modern Businesses
Premium MEAN Stack Development Solutions for Modern BusinessesPremium MEAN Stack Development Solutions for Modern Businesses
Premium MEAN Stack Development Solutions for Modern Businesses
 
Business Valuation Principles for Entrepreneurs
Business Valuation Principles for EntrepreneursBusiness Valuation Principles for Entrepreneurs
Business Valuation Principles for Entrepreneurs
 
FINAL PRESENTATION.pptx12143241324134134
FINAL PRESENTATION.pptx12143241324134134FINAL PRESENTATION.pptx12143241324134134
FINAL PRESENTATION.pptx12143241324134134
 
Attending a job Interview for B1 and B2 Englsih learners
Attending a job Interview for B1 and B2 Englsih learnersAttending a job Interview for B1 and B2 Englsih learners
Attending a job Interview for B1 and B2 Englsih learners
 
falcon-invoice-discounting-a-premier-platform-for-investors-in-india
falcon-invoice-discounting-a-premier-platform-for-investors-in-indiafalcon-invoice-discounting-a-premier-platform-for-investors-in-india
falcon-invoice-discounting-a-premier-platform-for-investors-in-india
 
一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理
一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理
一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理
 
The-McKinsey-7S-Framework. strategic management
The-McKinsey-7S-Framework. strategic managementThe-McKinsey-7S-Framework. strategic management
The-McKinsey-7S-Framework. strategic management
 
Brand Analysis for an artist named Struan
Brand Analysis for an artist named StruanBrand Analysis for an artist named Struan
Brand Analysis for an artist named Struan
 
Skye Residences | Extended Stay Residences Near Toronto Airport
Skye Residences | Extended Stay Residences Near Toronto AirportSkye Residences | Extended Stay Residences Near Toronto Airport
Skye Residences | Extended Stay Residences Near Toronto Airport
 
ModelingMarketingStrategiesMKS.CollumbiaUniversitypdf
ModelingMarketingStrategiesMKS.CollumbiaUniversitypdfModelingMarketingStrategiesMKS.CollumbiaUniversitypdf
ModelingMarketingStrategiesMKS.CollumbiaUniversitypdf
 

Short introduction to SAP security research (sitNL)

  • 1. A short introduction to SAP Security Research I found SAP vulnerabilities and all I got is this T-shirt of pretty decent quality
  • 2. Agenda SAP Security Research Introduction What is it? Why do it? How to do it? Some examples of found vulnerabilities Key takeaways
  • 5. Introduction (SAP) Security in the news  on the rise
  • 6. Introduction Many Security-sessions @ Teched && d-code nowadays
  • 7. Introduction Why SAP, why Now? As presented at the SAP Teched 2014 by Yonko Yonchev (Product Security Response Team – SAP SE): • SAP is globally 3rd largest software company • SAP handles 74% of the world’s financial transactions • Majority of Fortune 500 companies run SAP • SAP Ariba connects more than 1 million companies in 190 countries Source: SAP Teched 2014 Session ITM114 - ITM114 – Post Heartbleed: Secure your SAP Systems and Business Secrets from Hackers! http://events.sap.com/teched/en/session/13526
  • 8. Introduction SAP Product Security Response Source: SAP Teched 2014 Session ITM114 - ITM114 – Post Heartbleed: Secure your SAP Systems and Business Secrets from Hackers! As presented at the SAP Teched 2014 by Yonko Yonchev (Product Security Response Team – SAP SE): http://events.sap.com/teched/en/session/13526 SAP internal process and external service to support high security levels at SAP customers’ systems with: • Responsible disclosures of identified vulnerabilities in collaboration with leading external SAP Security researchers and hackers • Managing the end-to-end SAP process for fixing and disclosing externally known / reported vulnerabilities • Deliver SAP Security notes in the monthly patch day • Supply internal SAP development with best practices on security issue prioritization and security correction disclosure
  • 9. Introduction SAP Security notes over the years • Percentage of externally reported vulnerabilities are on the rise • Total number of monthly SAP Security notes are decreasing • Number of external researches is increasing Source: SAP Teched 2014 Session ITM114 - ITM114 – Post Heartbleed: Secure your SAP Systems and Business Secrets from Hackers! As presented at the SAP Teched 2014 by Yonko Yonchev (Product Security Response Team – SAP SE): http://events.sap.com/teched/en/session/13526
  • 10. Introduction SAP Security researchers, some statistics Source: http://scn.sap.com/blogs/securesap/2013/04/02/statistics-tell-sap-security-know-how-is-a-scarce-resource • There are worldwide ~100 external SAP Security researchers that reported over 450 vulnerabilities so far • 80% of those reported vulnerabilities in SAP products originate from only 7 companies • 80% of all reported vulnerabilities in SAP products originate from only 23 researchers • 50% of those reported vulnerabilities in SAP products originate from only 8 researchers
  • 11. What is it....? SAP Security research
  • 12. How to do SAP Security research? SAP Security research • Manually • Tools; Scanners, Fuzzers, Debuggers, Decompilers, Indexers, etc, etc… • By using SAP differently (hacker mindset) • Actually RTFM ;-) • Unlimited possibilities; hardware, software, network, protocols, Database, Operating System, application layer, frontend, ABAP, JAVA, agents, etc, etc…
  • 13. What if you find a vulnerability? SAP Security research • Report it to SAP via responsible disclosure • Give SAP the details • Give SAP time to fix the issue • Give customers a grace period of at least 3 months to apply the patch
  • 14. Why do it....? SAP Security Research • To improve security of SAP systems • Learn more about the inner working of SAP • Because it is challenging and FUN • It might bring you eternal fame and/or a T-shirt
  • 15. Example 1; combination of vulnerabilities to completely compromise a SAP system Found vulnerabilities… 1. A default password for user SMDAGENT_<SID> in Solution Manager 2. Remote enabled function module /SDF/GEN_PROXY that acts like a wrapper 3. Remote enabled function module /SDF/RBE_NATSQL_SELECT that lacks authorization checks and lets you execute native SQL commands Use the above to select password hashes from table USR02 and bruteforce these.
  • 16. Example 1; combination of vulnerabilities to completely compromise a SAP system Found vulnerabilities… • Change password of user SMDAGENT_<SID> • Apply OSS note 1774432 (CVSS score 4.6) • Apply OSS note 1727914 (CVSS score 7.5) SOLUTION:
  • 17. Example 2; Operating System Command Injection Found vulnerabilities… • Function Module EXE_SAPOSCOL can be used to inject Operating system commands Use this for example to gain direct access to the database, stop SAP systems, create operating users, etc, etc.
  • 18. Found vulnerabilities… • Apply OSS note 1577513 (CVSS score 5.5) SOLUTION: Example 2; Operating System Command Injection
  • 19. Example 3; SQL Injection Found vulnerabilities… • RFC module RFC_RSUPG_EXEC can be used to inject SQL commands Use this to gain direct access to the database.
  • 20. Found vulnerabilities… • Apply OSS note 1831463 (CVSS score 4.9) SOLUTION: Example 3; SQL Injection
  • 21. Key Take-aways Key Take-aways • Secure your SAP systems by applying SAP Security notes on a regular basis! • If you find a bug/flaw that might have security impact; report it to the SAP Security team (secure@sap.com) • If you have some spare time, a SAP system (NOT IN PRD), permission and feel like hacking… Go try and find some vulnerabilities yourself ;-)
  • 22. Website: www.erp-sec.com Twitter: @jvis @erpsec Need more info? Contact us...
  • 24. SAP, R/3, ABAP, SAP GUI, SAP NetWeaver and other SAP products and services mentioned herein as well as their respective logos are trademarks or registered trademarks of SAP AG in Germany and other countries. All other product and service names mentioned are the trademarks of their respective companies. Data contained in this document serves informational purposes only. The authors assume no responsibility for errors or omissions in this document. The authors do not warrant the accuracy or completeness of the information, text, graphics, links, or other items contained within this material. This document is provided without a warranty of any kind, either express or implied, including but not limited to the implied warranties of merchantability, fitness for a particular purpose, or non-infringement. The authors shall have no liability for damages of any kind including without limitation direct, special, indirect, or consequential damages that may result from the use of this document. SAP AG is neither the author nor the publisher of this publication and is not responsible for its content, and SAP Group shall not be liable for errors or omissions with respect to the materials. No part of this document may be reproduced without the prior written permission of ERP Security BV. © 2013 ERP Security BV. Disclaimer