SlideShare a Scribd company logo
1 of 52
Download to read offline
Inception of the SAP®
Platform's Brain
Attacks on SAP Solution Manager
November 30th
, 2012
DeepSec, Vienna.
Juan Perez-EtchegoyenJuan Perez-Etchegoyen
jppereze@onapsis.comjppereze@onapsis.com
2www.onapsis.com – © 2012 Onapsis , Inc. – All rights reservedAttacks on SAP Solution Manager
Disclaimer
This publication is copyright 2012 Onapsis, Inc. – All rights reserved.
This publication contains references to the products of SAP AG. SAP, R/3, xApps, xApp, SAP
NetWeaver, Duet, PartnerEdge, ByDesign, SAP Business ByDesign, and other SAP products and
services mentioned herein are trademarks or registered trademarks of SAP AG in Germany and in
several other countries all over the world.
Business Objects and the Business Objects logo, BusinessObjects, Crystal Reports, Crystal
Decisions, Web Intelligence, Xcelsius and other Business Objects products and services mentioned
herein are trademarks or registered trademarks of Business Objects in the United States and/or other
countries.
SAP AG is neither the author nor the publisher of this publication and is not responsible for its content,
and SAP Group shall not be liable for errors or omissions with respect to the materials.
3www.onapsis.com – © 2012 Onapsis , Inc. – All rights reservedAttacks to SAP Web Applications
Who is Onapsis, Inc.?
 Company focused in the security of ERP systems and business-critical
infrastructure (SAP®
, Siebel®
, Oracle®
E-Business SuiteTM
, PeopleSoft®
, JD Edwards®
…).
 Working with Global Fortune-100 and large governmental organizations.
 What does Onapsis do?
 Innovative ERP security software (Onapsis X1, Onapsis IPS ,Onapsis Bizploit).
 ERP security consulting services.
 Trainings on business-critical infrastructure security.
Who am I?
Juan Perez-Etchegoyen, CTO at Onapsis.
 Discovered several vulnerabilities in SAP and Oracle ERPs...
 Speaker/Trainer at BlackHat, HITB, Ekoparty, Source, DeepSec...
 Collaborator in the “SAP Security In-Depth” publication.
Attacks on SAP Solution ManagerAttacks on SAP Solution Manager
4www.onapsis.com – © 2012 Onapsis , Inc. – All rights reservedAttacks to SAP Web Applications
Agenda
 Introduction
 The SAP Solution Manager (SolMan)
 Central User Administration (CUA)
 Computing Center Management System (CCMS)
 Solution Manager Diagnostics (SMD)
 Conclusions
Cyber-Attacks to SAP SystemsAttacks on SAP Solution Manager
5www.onapsis.com – © 2012 Onapsis , Inc. – All rights reservedAttacks to SAP Web Applications
IntroductionIntroduction
Attacks on SAP Solution Manager
6www.onapsis.com – © 2012 Onapsis , Inc. – All rights reservedSAP Backdoors Presentation
7www.onapsis.com – © 2012 Onapsis , Inc. – All rights reservedAttacks on SAP Solution Manager
What is SAP?
● Largest provider of business management solutions in the world.
● More than 140.000 implementations around the globe.
● More than 90.000 customers in 120 countries.
● Used by Global Fortune-1000 companies, governmental
organizations and defense agencies to run their every-day business
processes.
● Such as Revenue / Production / Expenditure business cycles.
8www.onapsis.com – © 2012 Onapsis , Inc. – All rights reservedAttacks on SAP Solution Manager
Ok… so, What is SAP?
● Developer of Business Applications.
● Applications processing critical business functions.
SALESSALES
PRODUCTIONPRODUCTION
FINANCIAL PLANNINGFINANCIAL PLANNING
INVOICINGINVOICING
PROCUREMENTPROCUREMENT
TREASURYTREASURY
LOGISTICSLOGISTICS
PAYROLLPAYROLL
BILLINGBILLING
HUMAN RESOURCESHUMAN RESOURCES
BIBI
BWBW
SCMSCM
ERPERP
PIPI
CRMCRM
SMSM
BOBO
SRMSRM
PLMPLMPORTALPORTAL
GRCGRC
9www.onapsis.com – © 2012 Onapsis , Inc. – All rights reservedAttacks on SAP Solution Manager
A Business-Critical Infrastructure
● ERP systems store and process the most critical business
information in the Organization.
● If the SAP platform is breached, an intruder would be able to
perform different attacks such as:
ESPIONAGE: Obtain customers/vendors/human resources
data, financial planning information, balances, profits, sales
information, manufacturing recipes, etc.
SABOTAGE: Paralyze the operation of the organization by
shutting down the SAP system, disrupting interfaces with other
systems and deleting critical information, etc.
FRAUD: Modify financial information, tamper sales and
purchase orders, create new vendors, modify vendor bank
account numbers, etc.
Over 95% of the SAP systems we
evaluated were exposed to
espionage, sabotage and fraud
cyber attacks.
Attackers do not need access credentials to perform
these attacks!
11www.onapsis.com – © 2012 Onapsis , Inc. – All rights reservedAttacks to SAP Web Applications
The SAPThe SAP
Solution ManagerSolution Manager
Attacks on SAP Solution Manager
12www.onapsis.com – © 2012 Onapsis , Inc. – All rights reservedAttacks on SAP Solution Manager
What is the SAP Solution Manager?
● SAP component required in every SAP implementation.
● Central point for the administration of SAP systems.
● Typically, it is connected to several customer’s SAP systems
● Does not hold any business data, but technical information about
customer’s SAP systems.
● Administrators connect to it to manage users, incidents, download
and apply patches, among other activities.
If an attacker breaks into the SolMan, all the connected
systems can be ultimately compromised!
13www.onapsis.com – © 2012 Onapsis , Inc. – All rights reservedAttacks on SAP Solution Manager
SAP SolMan Infrastructure
DEV
QA
PRD
14www.onapsis.com – © 2012 Onapsis , Inc. – All rights reservedAttacks on SAP Solution Manager
15www.onapsis.com – © 2012 Onapsis , Inc. – All rights reservedAttacks on SAP Solution Manager
The Initial Compromise
If not compliant with BIZEC TEC/11, an anonymous attacker could easily
compromise a satellite SAP system.
● BIZEC TEC-01: Vulnerable Software in Use
● BIZEC TEC-02: Standard Users with Default Passwords
● BIZEC TEC-03: Unsecured SAP Gateway
● BIZEC TEC-04: Unsecured SAP/Oracle authentication
● BIZEC TEC-05: Insecure RFC interfaces
● BIZEC TEC-06: Insufficient Security Audit Logging
● BIZEC TEC-07: Unsecured SAP Message Server
● BIZEC TEC-08: Dangerous SAP Web Applications
● BIZEC TEC-09: Unprotected Access to Administration Services
● BIZEC TEC-10: Insecure Network Environment
● BIZEC TEC-11: Unencrypted Communications
16www.onapsis.com – © 2012 Onapsis , Inc. – All rights reservedAttacks on SAP Solution Manager
The Initial Compromise
If not compliant with BIZEC TEC/11, an anonymous attacker could easily
compromise a satellite SAP system.
● BIZEC TEC-01: Vulnerable Software in Use
● BIZEC TEC-02: Standard Users with Default Passwords
● BIZEC TEC-03: Unsecured SAP Gateway
● BIZEC TEC-04: Unsecured SAP/Oracle authentication
● BIZEC TEC-05: Insecure RFC interfaces
● BIZEC TEC-06: Insufficient Security Audit Logging
● BIZEC TEC-07: Unsecured SAP Message Server
● BIZEC TEC-08: Dangerous SAP Web Applications
● BIZEC TEC-09: Unprotected Access to Administration Services
● BIZEC TEC-10: Insecure Network Environment
● BIZEC TEC-11: Unencrypted Communications
17www.onapsis.com – © 2012 Onapsis , Inc. – All rights reservedAttacks on SAP Solution Manager
The Initial Compromise
If not compliant with BIZEC TEC/11, an anonymous attacker could easily
compromise a satellite SAP system.
● BIZEC TEC-01: Vulnerable Software in Use
● BIZEC TEC-02: Standard Users with Default Passwords
● BIZEC TEC-03: Unsecured SAP Gateway
● BIZEC TEC-04: Unsecured SAP/Oracle authentication
● BIZEC TEC-05: Insecure RFC interfaces
● BIZEC TEC-06: Insufficient Security Audit Logging
● BIZEC TEC-07: Unsecured SAP Message Server
● BIZEC TEC-08: Dangerous SAP Web Applications
● BIZEC TEC-09: Unprotected Access to Administration Services
● BIZEC TEC-10: Insecure Network Environment
● BIZEC TEC-11: Unencrypted Communications
18www.onapsis.com – © 2012 Onapsis , Inc. – All rights reservedAttacks on SAP Solution Manager
The Initial Compromise
If not compliant with BIZEC TEC/11, an anonymous attacker could easily
compromise a satellite SAP system.
● BIZEC TEC-01: Vulnerable Software in Use
● BIZEC TEC-02: Standard Users with Default Passwords
● BIZEC TEC-03: Unsecured SAP Gateway
● BIZEC TEC-04: Unsecured SAP/Oracle authentication
● BIZEC TEC-05: Insecure RFC interfaces
● BIZEC TEC-06: Insufficient Security Audit Logging
● BIZEC TEC-07: Unsecured SAP Message Server
● BIZEC TEC-08: Dangerous SAP Web Applications
● BIZEC TEC-09: Unprotected Access to Administration Services
● BIZEC TEC-10: Insecure Network Environment
● BIZEC TEC-11: Unencrypted Communications
19www.onapsis.com – © 2012 Onapsis , Inc. – All rights reservedAttacks to SAP Web Applications
SAP SolMan RFC Connections
● RFC connections to and from the Solution Manager created by default
● TRUSTED connections imply a trust relationship (a user with S_RFCACL
authorization is required)
● BACK connections imply access from satellite systems to Solution Manager.
● Connections with stored password can be used to do remote logons or
remotely execute RFC “remote-enabled” function modules.
Attacks on SAP Solution Manager
RFC Destination
SM_<SID>CLNT<Client>_LOGIN
SM_<SID>CLNT<Client>_READ
SM_<SID>CLNT<Client>_TRUSTE
D
SM_<SID>CLNT<Client>_TMW
SM_<SID>CLNT<Client>_BACK
20www.onapsis.com – © 2012 Onapsis , Inc. – All rights reservedAttacks to SAP Web Applications
Abuse of default RFC connections
Attacks on SAP Solution Manager
● Remote
Logon
Using
SAP GUI
21www.onapsis.com – © 2012 Onapsis , Inc. – All rights reservedAttacks to SAP Web Applications
Abuse of default RFC connections
Attacks on SAP Solution Manager
Non
interactive
user?
●Remote
Execution
of RFC
Function
Modules
22www.onapsis.com – © 2012 Onapsis , Inc. – All rights reservedAttacks to SAP Web ApplicationsAttacks on SAP Solution Manager
23www.onapsis.com – © 2012 Onapsis , Inc. – All rights reservedAttacks to SAP Web ApplicationsAttacks on SAP Solution Manager
24www.onapsis.com – © 2012 Onapsis , Inc. – All rights reservedAttacks to SAP Web ApplicationsAttacks on SAP Solution Manager
25www.onapsis.com – © 2012 Onapsis , Inc. – All rights reservedAttacks to SAP Web Applications
SAP SolMan and Gateway attacks
● SAP Solution Manager is highly dependent on the Gateway: several
external servers are registered by default.
● If the attacker knows/can guess the TPNAME, and the Gateway is not
protected (by default), then all the well-known Gateway attacks can be
triggered:
● RFC callback attacks.
● Cancellation of required external servers (DoS).
● Man-in-the-middle attacks through RFC. No sensitive business data,
but technical information, useful for other attacks, can be intercepted
(and modified).
Attacks on SAP Solution Manager
26www.onapsis.com – © 2012 Onapsis , Inc. – All rights reservedAttacks to SAP Web Applications
SAP SolMan and Gateway attacks
● SAP Solution Manager is highly dependent on the Gateway: several
external servers are registered by default.
● If the attacker knows/can guess the TPNAME, and the Gateway is not
protected (by default), then all the well-known Gateway attacks can be
triggered:
● RFC callback attacks.
● Cancellation of required external servers (DoS).
● Man-in-the-middle attacks through RFC. No sensitive business data,
but technical information, useful for other attacks, can be intercepted
(and modified).
Attacks on SAP Solution Manager
Protection / Countermeasure
 Restrict the assignment of user authorizations to logon from trusted systems
(S_RFCACL and S_RFC).
 Use authorization object S_ICF on calling systems, controlling who can use
which RFC destination.
 Restrict who can access RFC destinations by transaction (SM59), by table
(RFCDES) and by authorization object (S_RFC_ADM).
 Restrict authorization object S_DEVELOP with activity 16 (execute) to control
who can test function modules using SE37.
27www.onapsis.com – © 2012 Onapsis , Inc. – All rights reservedAttacks to SAP Web Applications
SAP SolMan and Gateway attacks
● SAP Solution Manager is highly dependent on the Gateway: several
external servers are registered by default.
● If the attacker knows/can guess the TPNAME, and the Gateway is not
protected (by default), then all the well-known Gateway attacks can be
triggered:
● RFC callback attacks.
● Cancellation of required external servers (DoS).
● Man-in-the-middle attacks through RFC. No sensitive business data,
but technical information, useful for other attacks, can be intercepted
(and modified).
Attacks on SAP Solution Manager
Protection / Countermeasure
 Protect and enforce security on ALL SAP
systems (SB,DEV,QA…) as the productive
system.
 Do not focus authorization checks on Dialog
users.
 Check the “References” slide for more information!
28www.onapsis.com – © 2012 Onapsis , Inc. – All rights reservedAttacks to SAP Web Applications
SAP Central UserSAP Central User
AdministrationAdministration
(CUA)(CUA)
Attacks on SAP Solution Manager
29www.onapsis.com – © 2012 Onapsis , Inc. – All rights reservedAttacks to SAP Web Applications
Central User Administration (CUA)
● The CUA Parent system needs to be allowed to create and administrate
users on every Child system.
● It allows SAP administrators to easily manage users of ALL the SAP
systems from a single point.
● Useful for ABAP and J2EE systems
integration.
Attacks on SAP Solution Manager
CUA enables the administration of users from a central SAP system
(usually the SolMan).
30www.onapsis.com – © 2012 Onapsis , Inc. – All rights reservedAttacks to SAP Web Applications
Central User Administration (CUA)
Attacks on SAP Solution Manager
http://help.sap.com/saphelp_nw73/helpdata/en/a9/1a1ba3db9343beb2723452255003c5/content.htm
● RFC Connections are
created:
● From Parent to Child
system (Trusted)
● From Child to Parent
system (Normal)
31www.onapsis.com – © 2012 Onapsis , Inc. – All rights reservedAttacks to SAP Web Applications
Attacks on Central User Administration
● If the CUA Parent (usually the SolMan) is compromised, arbitrary
users with any profiles can be created in all satellite systems.
● Note: Common RFC function modules used to create users do not
work neither on child or parent systems when CUA is enabled  Other
set of functions need to be used (the ones used by CUA itself).
Attacks on SAP Solution Manager
32www.onapsis.com – © 2012 Onapsis , Inc. – All rights reservedAttacks to SAP Web Applications
Attacks on Central User Administration
● If the CUA Parent (usually the SolMan) is compromised, arbitrary
users with any profiles can be created in all satellite systems.
● Note: Common RFC function modules used to create users do not
work neither on child or parent systems when CUA is enabled  Other
set of functions need to be used (the ones used by CUA itself).
Attacks on SAP Solution Manager
33www.onapsis.com – © 2012 Onapsis , Inc. – All rights reservedAttacks to SAP Web Applications
Attacks on Central User Administration
● If the CUA Parent (usually the SolMan) is compromised, arbitrary
users with any profiles can be created in all satellite systems.
● Note: Common RFC function modules used to create users do not
work neither on child or parent systems when CUA is enabled  Other
set of functions need to be used (the ones used by CUA itself).
Attacks on SAP Solution Manager
Protection / Countermeasure
 Restrict the usage of CUA RFC destinations for user
administrators only, by using authorization object S_ICF on the
CUA master.
 Use a special client within the SolMan to run the CUA master.
34www.onapsis.com – © 2012 Onapsis , Inc. – All rights reservedAttacks to SAP Web Applications
SAP ComputingSAP Computing
Center ManagementCenter Management
System (CCMS)System (CCMS)
Attacks on SAP Solution Manager
35www.onapsis.com – © 2012 Onapsis , Inc. – All rights reservedAttacks to SAP Web Applications
SAP CCMS
● Monitoring infrastructure provided by SAP to monitor SAP Application
Servers. It can be configured centrally, using a central server (CEN)
defined to receive all alerts.
● An AGENT is required to be executed on each monitored server. The
agent :
● Is implemented as an RFC server, which exposes several
functions.
● Registers itself as an EXTERNAL SERVER in the CEN, with a
specific TPNAME (following a well-known pattern).
● Is running as <SID>adm  Any abuse or exploitation would imply
a full compromise of the SAP system information.
Attacks on SAP Solution Manager
36www.onapsis.com – © 2012 Onapsis , Inc. – All rights reservedAttacks on SAP Solution Manager
SAP CCMS Infrastructure
DEV
QA
PRD
In many cases the Solution Manager is used as the CCMS Central
Server (CEN), receiving information from all managed systems.
37www.onapsis.com – © 2012 Onapsis , Inc. – All rights reservedAttacks to SAP Web Applications
SAP CCMS RFC Connections
● RFC Connections from the CEN are created by default
● The COLLECT destination has stored logon data and can be used
to remotely execute function modules in the monitored systems.
● The ANALYZE destination is typically used with a highly-privileged
user, but has no stored logon information.
● Additionally, the agent connects back to the CEN using the CMSREG
user, whose credentials are stored in a local file in the agent system
(/usr/sap/SID/INSTANCE/log/sapccm4x/passwd).
Attacks on SAP Solution Manager
RFC Destination
<SID>_RZ20_COLLECT
<SID>_RZ20_ANALYZE
38www.onapsis.com – © 2012 Onapsis , Inc. – All rights reservedAttacks to SAP Web Applications
Attacks on the SAP CCMS Agent
● One of the functions exposed by the CCMS agent can be used to
execute OS commands remotely without authentication.
● As the agent is executed with SIDadm privileges  An attacker could
get full compromise of the monitored SAP System going through the
CEN’s gateway.
Attacks on SAP Solution Manager
39www.onapsis.com – © 2012 Onapsis , Inc. – All rights reservedAttacks to SAP Web Applications
Attacks on the SAP CCMS Agent
● One of the functions exposed by the CCMS agent can be used to
execute OS commands remotely without authentication.
● As the agent is executed with SIDadm privileges  An attacker could
get full compromise of the monitored SAP System going through the
CEN’s gateway.
Attacks on SAP Solution Manager
Protection / Countermeasure
Solution: Apply SAP Security Note 1758450
 Mitigation: Secure the SAP Gateway, only allowing
connections from authorized systems to the CCMS agents
working as registered servers.
40www.onapsis.com – © 2012 Onapsis , Inc. – All rights reservedAttacks to SAP Web Applications
SAP Solution ManagerSAP Solution Manager
Diagnostics (SMD)Diagnostics (SMD)
Attacks on SAP Solution Manager
41www.onapsis.com – © 2012 Onapsis , Inc. – All rights reservedAttacks to SAP Web Applications
SAP SMD
● “Solution Manager Diagnostics provides all functionality to centrally
analyze and monitor a complete NetWeaver system landscape”.
● An AGENT is required to be executed on each monitored server. The
agent :
● Is developed in JAVA and installed as a new SAP system (typically
using a high system number like 97 or 98).
● Exposes an anonymous P4 interface with a reduced set of
methods.
● Connects back to the Solution Manager, using a highly-privileged
user account.
Attacks on SAP Solution Manager
42www.onapsis.com – © 2012 Onapsis , Inc. – All rights reservedAttacks to SAP Web Applications
Abuse of SMD stored credentials
● If a monitored system is compromised, the credentials of the user
used for the connection can be decrypted (kudos to Jordan
Santarsieri @Onapsis).
● Using these credentials, an attacker can connect back to the Solution
Manager with high privileges.
● Once logged to the Solution Manager, the compromise can be
extended by using default RFC connections to all managed/satellite
systems.
Attacks on SAP Solution Manager
43www.onapsis.com – © 2012 Onapsis , Inc. – All rights reservedAttacks to SAP Web Applications
Abuse of SMD stored credentials
● If a monitored system is compromised, the credentials of the user
used for the connection can be decrypted (kudos to Jordan
Santarsieri @Onapsis).
● Using these credentials, an attacker can connect back to the Solution
Manager with high privileges.
● Once logged to the Solution Manager, the compromise can be
extended by using default RFC connections to all managed/satellite
systems.
Attacks on SAP Solution Manager
Protection / Countermeasure
 Avoid the initial compromise of SAP system running the SMD
agent.
 Restrict access to the secure storage file at the file-system
level.
44www.onapsis.com – © 2012 Onapsis , Inc. – All rights reservedAttacks to SAP Web Applications
Abuse of SMD P4 interface
● Once the SMD agent is installed, the P4 interface is exposed on TCP
service 5XX04 (instance num. XX).
● The P4 interface configured in the SMD agent is exposing a method
that allows the installation of an application in the SMD agent, leading to
remote OS command execution.
● Commands are executed as the <SID>adm user (daaadm, smdadm…)
● This leads to a full compromise of any SAP system configured on the
Application Server.
Attacks on SAP Solution Manager
45www.onapsis.com – © 2012 Onapsis , Inc. – All rights reservedAttacks to SAP Web Applications
Abuse of SMD P4 interface
● Once the SMD agent is installed, the P4 interface is exposed on TCP
service 5XX04 (instance num. XX).
● The P4 interface configured in the SMD agent is exposing a method
that allows the installation of an application in the SMD agent, leading to
remote OS command execution.
● Commands are executed as the <SID>adm user (daaadm, smdadm…)
● This leads to a full compromise of any SAP system configured on the
Application Server.
Attacks on SAP Solution Manager
46www.onapsis.com – © 2012 Onapsis , Inc. – All rights reservedAttacks to SAP Web Applications
Abuse of SMD P4 interface
● Once the SMD agent is installed, the P4 interface is exposed on TCP
service 5XX04 (instance num. XX).
● The P4 interface configured in the SMD agent is exposing a method
that allows the installation of an application in the SMD agent, leading to
remote OS command execution.
● Commands are executed as the <SID>adm user (daaadm, smdadm…)
● This leads to a full compromise of any SAP system configured on the
Application Server.
Attacks on SAP Solution Manager
Protection / Countermeasure
Solution: Apply SAP Security Note 1774568
Mitigation: Follow SAP recommendations and restrict access
to P4 interface in SAP systems, as potentially insecure services
might be exposed.
47www.onapsis.com – © 2012 Onapsis , Inc. – All rights reservedAttacks to SAP Web Applications
ConclusionsConclusions
Attacks on SAP Solution Manager
48www.onapsis.com – © 2012 Onapsis , Inc. – All rights reservedAttacks to SAP Web Applications
Conclusions
● If an attacker breaks into the SAP Solution Manager, the game is over:
he would be able to compromise all managed satellite systems.
● Trust relationships are necessary in most SAP implementations. Extra
caution:
● Which users can log-in using this feature (S_RFCACL).
● Which authorizations are being granted to these users.
● RFC connections are necessary in all SAP implementations. Whenever
possible:
● Use encryption (SNC). It should be mandatory for business related
communications.
● Avoid using connections with stored credentials.
● Avoid using connections from systems with lower security classification to
systems with higher security classification (DEV  PRD!)
● Monitor the creation/management of RFC connections, as one single
connection from DEV  PRD could result in a full system compromise if
exploited.
Attacks on SAP Solution Manager
49www.onapsis.com – © 2012 Onapsis , Inc. – All rights reservedAttacks to SAP Web Applications
● If possible, use different Solution Manager/CEN systems for Production
environments.
● Secure the Solution Manager as ANY other Productive System
● Secure all satellite systems managed by an SAP Solution Manager:
● Segregation of Duties (SoD) is really necessary, but not enough.
● Implement a secure technical configuration of satellite systems.
● Perform continuous/automated security monitoring.
● Do not expose the Solution Manager to the Internet!
● Restrict network access to the SAP Systems. Use firewalls/network filters to
restrict potentially insecure interfaces.
● Update the systems, use the latest versions of all SAP solutions and apply
all relevant SAP Security Notes.
Attacks on SAP Solution Manager
Conclusions
50www.onapsis.com – © 2012 Onapsis , Inc. – All rights reservedAttacks to SAP Web Applications
1. Additional Information about Gateway and RFC security - Secure Configuration SAP NetWeaver Application
Server ABAP” https://websmp109.sap-ag.de/~sapdownload/011000358700000968282010E/SAP-Sec-Rec.pdf
2. Best Practice - How to analyze and secure RFC connections
http://wiki.sdn.sap.com/wiki/display/Security/Best+Practice+-+How+to+analyze+and+secure+RFC+connections
3. RFC/ICF Security Guide
http://help.sap.com/saphelp_nw73ehp1/helpdata/en/48/92486caa6b17cee10000000a421937/frameset.htm
4. Security Settings in the SAP Gateway
http://help.sap.com/saphelp_nw73ehp1/helpdata/en/48/b2096e7895307be10000000a42189b/frameset.htm
5. Securing RFC Connections http://scn.sap.com/docs/DOC-17089
6. Security Guide for Connectivity with the AS Java
http://help.sap.com/saphelp_nw73ehp1/helpdata/en/b3/17d13fa69a4921e10000000a1550b0/frameset.htm
7. SolMan Security Guide: http://service.sap.com/~form/sapnet?
_SHORTKEY=01100035870000735220&_OBJECT=011000358700000482312011E
8. Onapsis X1 http://www.onapsis.com/x1
Attacks on SAP Solution Manager
References
51www.onapsis.com – © 2012 Onapsis , Inc. – All rights reservedAttacks to SAP Web Applications
Questions?Questions?
Follow us! @onapsis
@jp_pereze
Attacks on SAP Solution Manager
jppereze@onapsis.comjppereze@onapsis.com
52www.onapsis.com – © 2012 Onapsis , Inc. – All rights reservedAttacks on SAP Solution Manager
Thank you!Thank you!

More Related Content

What's hot

SAP Business Objects Attacks
SAP Business Objects AttacksSAP Business Objects Attacks
SAP Business Objects AttacksOnapsis Inc.
 
All your SAP passwords belong to us
All your SAP passwords belong to usAll your SAP passwords belong to us
All your SAP passwords belong to usERPScan
 
Attacking SAP users with sapsploit
Attacking SAP users with sapsploit Attacking SAP users with sapsploit
Attacking SAP users with sapsploit ERPScan
 
Exploiting Critical Attack Vectors to Gain Control of SAP Systems
Exploiting Critical Attack Vectors to Gain Control of SAP SystemsExploiting Critical Attack Vectors to Gain Control of SAP Systems
Exploiting Critical Attack Vectors to Gain Control of SAP SystemsOnapsis Inc.
 
Assess and monitor SAP security
Assess and monitor SAP securityAssess and monitor SAP security
Assess and monitor SAP securityERPScan
 
Onapsis SAP Forensics: Detecting White-Collar Cyber Crime with SAP Forensics
Onapsis SAP Forensics: Detecting White-Collar Cyber Crime with SAP ForensicsOnapsis SAP Forensics: Detecting White-Collar Cyber Crime with SAP Forensics
Onapsis SAP Forensics: Detecting White-Collar Cyber Crime with SAP ForensicsOnapsis Inc.
 
Attacks Based on Security Configurations
Attacks Based on Security ConfigurationsAttacks Based on Security Configurations
Attacks Based on Security ConfigurationsOnapsis Inc.
 
Unbreakable oracle er_ps_siebel_jd_edwards
Unbreakable oracle er_ps_siebel_jd_edwardsUnbreakable oracle er_ps_siebel_jd_edwards
Unbreakable oracle er_ps_siebel_jd_edwardsOnapsis Inc.
 
Assessing and Securing SAP Solutions
Assessing and Securing SAP SolutionsAssessing and Securing SAP Solutions
Assessing and Securing SAP SolutionsERPScan
 
Practical SAP pentesting (B-Sides San Paulo)
Practical SAP pentesting (B-Sides San Paulo)Practical SAP pentesting (B-Sides San Paulo)
Practical SAP pentesting (B-Sides San Paulo)ERPScan
 
5 real ways to destroy business by breaking SAP applications
5 real ways to destroy business by breaking SAP applications5 real ways to destroy business by breaking SAP applications
5 real ways to destroy business by breaking SAP applicationsERPScan
 
If I want a perfect cyberweapon, I'll target ERP - second edition
If I want a perfect cyberweapon, I'll target ERP - second editionIf I want a perfect cyberweapon, I'll target ERP - second edition
If I want a perfect cyberweapon, I'll target ERP - second editionERPScan
 
SAP SDM Hacking
SAP SDM HackingSAP SDM Hacking
SAP SDM HackingERPScan
 
Incident Response and SAP Systems
Incident Response and SAP SystemsIncident Response and SAP Systems
Incident Response and SAP SystemsOnapsis Inc.
 
SAP security landscape. How to protect(hack) your(their) big business
SAP security landscape. How to protect(hack) your(their) big businessSAP security landscape. How to protect(hack) your(their) big business
SAP security landscape. How to protect(hack) your(their) big businessERPScan
 
Practical pentesting of ERPs and business applications
Practical pentesting of ERPs and business applicationsPractical pentesting of ERPs and business applications
Practical pentesting of ERPs and business applicationsERPScan
 
Breaking, forensicating and anti-forensicating SAP Portal and J2EE Engine
Breaking, forensicating and anti-forensicating SAP Portal and J2EE EngineBreaking, forensicating and anti-forensicating SAP Portal and J2EE Engine
Breaking, forensicating and anti-forensicating SAP Portal and J2EE EngineERPScan
 
Attacking SAP Mobile
Attacking SAP MobileAttacking SAP Mobile
Attacking SAP MobileERPScan
 
SSRF vs. Business-critical applications. Part 2. New vectors and connect-back...
SSRF vs. Business-critical applications. Part 2. New vectors and connect-back...SSRF vs. Business-critical applications. Part 2. New vectors and connect-back...
SSRF vs. Business-critical applications. Part 2. New vectors and connect-back...ERPScan
 

What's hot (20)

SAP Business Objects Attacks
SAP Business Objects AttacksSAP Business Objects Attacks
SAP Business Objects Attacks
 
All your SAP passwords belong to us
All your SAP passwords belong to usAll your SAP passwords belong to us
All your SAP passwords belong to us
 
Attacking SAP users with sapsploit
Attacking SAP users with sapsploit Attacking SAP users with sapsploit
Attacking SAP users with sapsploit
 
Exploiting Critical Attack Vectors to Gain Control of SAP Systems
Exploiting Critical Attack Vectors to Gain Control of SAP SystemsExploiting Critical Attack Vectors to Gain Control of SAP Systems
Exploiting Critical Attack Vectors to Gain Control of SAP Systems
 
Assess and monitor SAP security
Assess and monitor SAP securityAssess and monitor SAP security
Assess and monitor SAP security
 
Onapsis SAP Forensics: Detecting White-Collar Cyber Crime with SAP Forensics
Onapsis SAP Forensics: Detecting White-Collar Cyber Crime with SAP ForensicsOnapsis SAP Forensics: Detecting White-Collar Cyber Crime with SAP Forensics
Onapsis SAP Forensics: Detecting White-Collar Cyber Crime with SAP Forensics
 
Sap security – thinking with a hacker’s hat
Sap security – thinking with a hacker’s hatSap security – thinking with a hacker’s hat
Sap security – thinking with a hacker’s hat
 
Attacks Based on Security Configurations
Attacks Based on Security ConfigurationsAttacks Based on Security Configurations
Attacks Based on Security Configurations
 
Unbreakable oracle er_ps_siebel_jd_edwards
Unbreakable oracle er_ps_siebel_jd_edwardsUnbreakable oracle er_ps_siebel_jd_edwards
Unbreakable oracle er_ps_siebel_jd_edwards
 
Assessing and Securing SAP Solutions
Assessing and Securing SAP SolutionsAssessing and Securing SAP Solutions
Assessing and Securing SAP Solutions
 
Practical SAP pentesting (B-Sides San Paulo)
Practical SAP pentesting (B-Sides San Paulo)Practical SAP pentesting (B-Sides San Paulo)
Practical SAP pentesting (B-Sides San Paulo)
 
5 real ways to destroy business by breaking SAP applications
5 real ways to destroy business by breaking SAP applications5 real ways to destroy business by breaking SAP applications
5 real ways to destroy business by breaking SAP applications
 
If I want a perfect cyberweapon, I'll target ERP - second edition
If I want a perfect cyberweapon, I'll target ERP - second editionIf I want a perfect cyberweapon, I'll target ERP - second edition
If I want a perfect cyberweapon, I'll target ERP - second edition
 
SAP SDM Hacking
SAP SDM HackingSAP SDM Hacking
SAP SDM Hacking
 
Incident Response and SAP Systems
Incident Response and SAP SystemsIncident Response and SAP Systems
Incident Response and SAP Systems
 
SAP security landscape. How to protect(hack) your(their) big business
SAP security landscape. How to protect(hack) your(their) big businessSAP security landscape. How to protect(hack) your(their) big business
SAP security landscape. How to protect(hack) your(their) big business
 
Practical pentesting of ERPs and business applications
Practical pentesting of ERPs and business applicationsPractical pentesting of ERPs and business applications
Practical pentesting of ERPs and business applications
 
Breaking, forensicating and anti-forensicating SAP Portal and J2EE Engine
Breaking, forensicating and anti-forensicating SAP Portal and J2EE EngineBreaking, forensicating and anti-forensicating SAP Portal and J2EE Engine
Breaking, forensicating and anti-forensicating SAP Portal and J2EE Engine
 
Attacking SAP Mobile
Attacking SAP MobileAttacking SAP Mobile
Attacking SAP Mobile
 
SSRF vs. Business-critical applications. Part 2. New vectors and connect-back...
SSRF vs. Business-critical applications. Part 2. New vectors and connect-back...SSRF vs. Business-critical applications. Part 2. New vectors and connect-back...
SSRF vs. Business-critical applications. Part 2. New vectors and connect-back...
 

Viewers also liked

Russiandefensebudgetprocurement 110629103450 Phpapp01
Russiandefensebudgetprocurement 110629103450 Phpapp01Russiandefensebudgetprocurement 110629103450 Phpapp01
Russiandefensebudgetprocurement 110629103450 Phpapp01LynchBrian
 
Unitednationspeaceoperations2009inreview 100410191544 Phpapp02
Unitednationspeaceoperations2009inreview 100410191544 Phpapp02Unitednationspeaceoperations2009inreview 100410191544 Phpapp02
Unitednationspeaceoperations2009inreview 100410191544 Phpapp02LynchBrian
 
10 Insightful Quotes On Designing A Better Customer Experience
10 Insightful Quotes On Designing A Better Customer Experience10 Insightful Quotes On Designing A Better Customer Experience
10 Insightful Quotes On Designing A Better Customer ExperienceYuan Wang
 
Learn BEM: CSS Naming Convention
Learn BEM: CSS Naming ConventionLearn BEM: CSS Naming Convention
Learn BEM: CSS Naming ConventionIn a Rocket
 
SEO: Getting Personal
SEO: Getting PersonalSEO: Getting Personal
SEO: Getting PersonalKirsty Hulse
 
How to Build a Dynamic Social Media Plan
How to Build a Dynamic Social Media PlanHow to Build a Dynamic Social Media Plan
How to Build a Dynamic Social Media PlanPost Planner
 
Lightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika Aldaba
Lightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika AldabaLightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika Aldaba
Lightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika Aldabaux singapore
 

Viewers also liked (8)

Russiandefensebudgetprocurement 110629103450 Phpapp01
Russiandefensebudgetprocurement 110629103450 Phpapp01Russiandefensebudgetprocurement 110629103450 Phpapp01
Russiandefensebudgetprocurement 110629103450 Phpapp01
 
Unitednationspeaceoperations2009inreview 100410191544 Phpapp02
Unitednationspeaceoperations2009inreview 100410191544 Phpapp02Unitednationspeaceoperations2009inreview 100410191544 Phpapp02
Unitednationspeaceoperations2009inreview 100410191544 Phpapp02
 
10 Insightful Quotes On Designing A Better Customer Experience
10 Insightful Quotes On Designing A Better Customer Experience10 Insightful Quotes On Designing A Better Customer Experience
10 Insightful Quotes On Designing A Better Customer Experience
 
Learn BEM: CSS Naming Convention
Learn BEM: CSS Naming ConventionLearn BEM: CSS Naming Convention
Learn BEM: CSS Naming Convention
 
SEO: Getting Personal
SEO: Getting PersonalSEO: Getting Personal
SEO: Getting Personal
 
Succession “Losers”: What Happens to Executives Passed Over for the CEO Job?
Succession “Losers”: What Happens to Executives Passed Over for the CEO Job? Succession “Losers”: What Happens to Executives Passed Over for the CEO Job?
Succession “Losers”: What Happens to Executives Passed Over for the CEO Job?
 
How to Build a Dynamic Social Media Plan
How to Build a Dynamic Social Media PlanHow to Build a Dynamic Social Media Plan
How to Build a Dynamic Social Media Plan
 
Lightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika Aldaba
Lightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika AldabaLightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika Aldaba
Lightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika Aldaba
 

Similar to Inception of the SAP Platforms Brain: Attacks on SAP Solution Manager

Inception of the SAP Platform's Brain: Attacks on SAP Solution Manager
Inception of the SAP Platform's Brain: Attacks on SAP Solution ManagerInception of the SAP Platform's Brain: Attacks on SAP Solution Manager
Inception of the SAP Platform's Brain: Attacks on SAP Solution ManagerOnapsis Inc.
 
A Holistic View on SAP Security Why Securing Production Systems Is Not Enough
 	A Holistic View on SAP Security Why Securing Production Systems Is Not Enough 	A Holistic View on SAP Security Why Securing Production Systems Is Not Enough
A Holistic View on SAP Security Why Securing Production Systems Is Not EnoughOnapsis Inc.
 
Onapsis SAP Backdoors
Onapsis SAP BackdoorsOnapsis SAP Backdoors
Onapsis SAP BackdoorsOnapsis Inc.
 
SAP security made easy
SAP security made easySAP security made easy
SAP security made easyERPScan
 
Blended Web and Database Attacks on Real Time In-memory Platforms
Blended Web and Database Attacks on Real Time In-memory PlatformsBlended Web and Database Attacks on Real Time In-memory Platforms
Blended Web and Database Attacks on Real Time In-memory PlatformsOnapsis Inc.
 
SAP Forensics Detecting White Collar Cyber-crime
SAP Forensics Detecting White Collar Cyber-crimeSAP Forensics Detecting White Collar Cyber-crime
SAP Forensics Detecting White Collar Cyber-crimeOnapsis Inc.
 
DeltaGRiC_Consulting_SMAC_Digital Innovation Security Conference_Presentation...
DeltaGRiC_Consulting_SMAC_Digital Innovation Security Conference_Presentation...DeltaGRiC_Consulting_SMAC_Digital Innovation Security Conference_Presentation...
DeltaGRiC_Consulting_SMAC_Digital Innovation Security Conference_Presentation...Tunde Ogunkoya
 
CoreToEdge Company Presentation
CoreToEdge Company PresentationCoreToEdge Company Presentation
CoreToEdge Company PresentationCore To Edge
 
Pen Testing SAP Critical Information Exposed
Pen Testing SAP Critical Information ExposedPen Testing SAP Critical Information Exposed
Pen Testing SAP Critical Information ExposedOnapsis Inc.
 
Delta g ric_consulting_presentation_erpscan_2015
Delta g ric_consulting_presentation_erpscan_2015Delta g ric_consulting_presentation_erpscan_2015
Delta g ric_consulting_presentation_erpscan_2015Tunde Ogunkoya
 
NSC #2 - D2 04 - Ezequiel Gutesman - Blended Web and Database Attacks
NSC #2 - D2 04 - Ezequiel Gutesman - Blended Web and Database AttacksNSC #2 - D2 04 - Ezequiel Gutesman - Blended Web and Database Attacks
NSC #2 - D2 04 - Ezequiel Gutesman - Blended Web and Database AttacksNoSuchCon
 
Secure HANA in the Cloud | Mitigating Internal & External Threats | Symmetry™
Secure HANA in the Cloud | Mitigating Internal & External Threats | Symmetry™ Secure HANA in the Cloud | Mitigating Internal & External Threats | Symmetry™
Secure HANA in the Cloud | Mitigating Internal & External Threats | Symmetry™ Symmetry™
 
Top 5 .NET Challenges, Performance Monitoring Tips & Tricks
Top 5 .NET Challenges, Performance Monitoring Tips & TricksTop 5 .NET Challenges, Performance Monitoring Tips & Tricks
Top 5 .NET Challenges, Performance Monitoring Tips & TricksAppDynamics
 
ERP Security. Myths, Problems, Solutions
ERP Security. Myths, Problems, SolutionsERP Security. Myths, Problems, Solutions
ERP Security. Myths, Problems, SolutionsERPScan
 
Sap fundamentals overview_for_sap_minors
Sap fundamentals overview_for_sap_minorsSap fundamentals overview_for_sap_minors
Sap fundamentals overview_for_sap_minorsCenk Ersoy
 
SAP portal: breaking and forensicating
SAP portal: breaking and forensicating SAP portal: breaking and forensicating
SAP portal: breaking and forensicating ERPScan
 
Integration for Microsoft Dynamics CRM and Microsoft Dynamics NAV
Integration for Microsoft Dynamics CRM and Microsoft Dynamics NAVIntegration for Microsoft Dynamics CRM and Microsoft Dynamics NAV
Integration for Microsoft Dynamics CRM and Microsoft Dynamics NAVScribe Software Corp.
 
Hints and Tips for Monitoring SAP
Hints and Tips for Monitoring SAPHints and Tips for Monitoring SAP
Hints and Tips for Monitoring SAPCA Nimsoft
 
2309 sap enterprise architecture in the era of sap hana, infrastructure, plat...
2309 sap enterprise architecture in the era of sap hana, infrastructure, plat...2309 sap enterprise architecture in the era of sap hana, infrastructure, plat...
2309 sap enterprise architecture in the era of sap hana, infrastructure, plat...Dao Van Hang
 

Similar to Inception of the SAP Platforms Brain: Attacks on SAP Solution Manager (20)

Inception of the SAP Platform's Brain: Attacks on SAP Solution Manager
Inception of the SAP Platform's Brain: Attacks on SAP Solution ManagerInception of the SAP Platform's Brain: Attacks on SAP Solution Manager
Inception of the SAP Platform's Brain: Attacks on SAP Solution Manager
 
A Holistic View on SAP Security Why Securing Production Systems Is Not Enough
 	A Holistic View on SAP Security Why Securing Production Systems Is Not Enough 	A Holistic View on SAP Security Why Securing Production Systems Is Not Enough
A Holistic View on SAP Security Why Securing Production Systems Is Not Enough
 
Onapsis SAP Backdoors
Onapsis SAP BackdoorsOnapsis SAP Backdoors
Onapsis SAP Backdoors
 
SAP security made easy
SAP security made easySAP security made easy
SAP security made easy
 
Blended Web and Database Attacks on Real Time In-memory Platforms
Blended Web and Database Attacks on Real Time In-memory PlatformsBlended Web and Database Attacks on Real Time In-memory Platforms
Blended Web and Database Attacks on Real Time In-memory Platforms
 
SAP Forensics Detecting White Collar Cyber-crime
SAP Forensics Detecting White Collar Cyber-crimeSAP Forensics Detecting White Collar Cyber-crime
SAP Forensics Detecting White Collar Cyber-crime
 
DeltaGRiC_Consulting_SMAC_Digital Innovation Security Conference_Presentation...
DeltaGRiC_Consulting_SMAC_Digital Innovation Security Conference_Presentation...DeltaGRiC_Consulting_SMAC_Digital Innovation Security Conference_Presentation...
DeltaGRiC_Consulting_SMAC_Digital Innovation Security Conference_Presentation...
 
CoreToEdge Company Presentation
CoreToEdge Company PresentationCoreToEdge Company Presentation
CoreToEdge Company Presentation
 
Pen Testing SAP Critical Information Exposed
Pen Testing SAP Critical Information ExposedPen Testing SAP Critical Information Exposed
Pen Testing SAP Critical Information Exposed
 
Delta g ric_consulting_presentation_erpscan_2015
Delta g ric_consulting_presentation_erpscan_2015Delta g ric_consulting_presentation_erpscan_2015
Delta g ric_consulting_presentation_erpscan_2015
 
NSC #2 - D2 04 - Ezequiel Gutesman - Blended Web and Database Attacks
NSC #2 - D2 04 - Ezequiel Gutesman - Blended Web and Database AttacksNSC #2 - D2 04 - Ezequiel Gutesman - Blended Web and Database Attacks
NSC #2 - D2 04 - Ezequiel Gutesman - Blended Web and Database Attacks
 
Managing SAP Custom Code
Managing SAP Custom CodeManaging SAP Custom Code
Managing SAP Custom Code
 
Secure HANA in the Cloud | Mitigating Internal & External Threats | Symmetry™
Secure HANA in the Cloud | Mitigating Internal & External Threats | Symmetry™ Secure HANA in the Cloud | Mitigating Internal & External Threats | Symmetry™
Secure HANA in the Cloud | Mitigating Internal & External Threats | Symmetry™
 
Top 5 .NET Challenges, Performance Monitoring Tips & Tricks
Top 5 .NET Challenges, Performance Monitoring Tips & TricksTop 5 .NET Challenges, Performance Monitoring Tips & Tricks
Top 5 .NET Challenges, Performance Monitoring Tips & Tricks
 
ERP Security. Myths, Problems, Solutions
ERP Security. Myths, Problems, SolutionsERP Security. Myths, Problems, Solutions
ERP Security. Myths, Problems, Solutions
 
Sap fundamentals overview_for_sap_minors
Sap fundamentals overview_for_sap_minorsSap fundamentals overview_for_sap_minors
Sap fundamentals overview_for_sap_minors
 
SAP portal: breaking and forensicating
SAP portal: breaking and forensicating SAP portal: breaking and forensicating
SAP portal: breaking and forensicating
 
Integration for Microsoft Dynamics CRM and Microsoft Dynamics NAV
Integration for Microsoft Dynamics CRM and Microsoft Dynamics NAVIntegration for Microsoft Dynamics CRM and Microsoft Dynamics NAV
Integration for Microsoft Dynamics CRM and Microsoft Dynamics NAV
 
Hints and Tips for Monitoring SAP
Hints and Tips for Monitoring SAPHints and Tips for Monitoring SAP
Hints and Tips for Monitoring SAP
 
2309 sap enterprise architecture in the era of sap hana, infrastructure, plat...
2309 sap enterprise architecture in the era of sap hana, infrastructure, plat...2309 sap enterprise architecture in the era of sap hana, infrastructure, plat...
2309 sap enterprise architecture in the era of sap hana, infrastructure, plat...
 

Recently uploaded

Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfngoud9212
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsAndrey Dotsenko
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 

Recently uploaded (20)

Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdf
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 

Inception of the SAP Platforms Brain: Attacks on SAP Solution Manager

  • 1. Inception of the SAP® Platform's Brain Attacks on SAP Solution Manager November 30th , 2012 DeepSec, Vienna. Juan Perez-EtchegoyenJuan Perez-Etchegoyen jppereze@onapsis.comjppereze@onapsis.com
  • 2. 2www.onapsis.com – © 2012 Onapsis , Inc. – All rights reservedAttacks on SAP Solution Manager Disclaimer This publication is copyright 2012 Onapsis, Inc. – All rights reserved. This publication contains references to the products of SAP AG. SAP, R/3, xApps, xApp, SAP NetWeaver, Duet, PartnerEdge, ByDesign, SAP Business ByDesign, and other SAP products and services mentioned herein are trademarks or registered trademarks of SAP AG in Germany and in several other countries all over the world. Business Objects and the Business Objects logo, BusinessObjects, Crystal Reports, Crystal Decisions, Web Intelligence, Xcelsius and other Business Objects products and services mentioned herein are trademarks or registered trademarks of Business Objects in the United States and/or other countries. SAP AG is neither the author nor the publisher of this publication and is not responsible for its content, and SAP Group shall not be liable for errors or omissions with respect to the materials.
  • 3. 3www.onapsis.com – © 2012 Onapsis , Inc. – All rights reservedAttacks to SAP Web Applications Who is Onapsis, Inc.?  Company focused in the security of ERP systems and business-critical infrastructure (SAP® , Siebel® , Oracle® E-Business SuiteTM , PeopleSoft® , JD Edwards® …).  Working with Global Fortune-100 and large governmental organizations.  What does Onapsis do?  Innovative ERP security software (Onapsis X1, Onapsis IPS ,Onapsis Bizploit).  ERP security consulting services.  Trainings on business-critical infrastructure security. Who am I? Juan Perez-Etchegoyen, CTO at Onapsis.  Discovered several vulnerabilities in SAP and Oracle ERPs...  Speaker/Trainer at BlackHat, HITB, Ekoparty, Source, DeepSec...  Collaborator in the “SAP Security In-Depth” publication. Attacks on SAP Solution ManagerAttacks on SAP Solution Manager
  • 4. 4www.onapsis.com – © 2012 Onapsis , Inc. – All rights reservedAttacks to SAP Web Applications Agenda  Introduction  The SAP Solution Manager (SolMan)  Central User Administration (CUA)  Computing Center Management System (CCMS)  Solution Manager Diagnostics (SMD)  Conclusions Cyber-Attacks to SAP SystemsAttacks on SAP Solution Manager
  • 5. 5www.onapsis.com – © 2012 Onapsis , Inc. – All rights reservedAttacks to SAP Web Applications IntroductionIntroduction Attacks on SAP Solution Manager
  • 6. 6www.onapsis.com – © 2012 Onapsis , Inc. – All rights reservedSAP Backdoors Presentation
  • 7. 7www.onapsis.com – © 2012 Onapsis , Inc. – All rights reservedAttacks on SAP Solution Manager What is SAP? ● Largest provider of business management solutions in the world. ● More than 140.000 implementations around the globe. ● More than 90.000 customers in 120 countries. ● Used by Global Fortune-1000 companies, governmental organizations and defense agencies to run their every-day business processes. ● Such as Revenue / Production / Expenditure business cycles.
  • 8. 8www.onapsis.com – © 2012 Onapsis , Inc. – All rights reservedAttacks on SAP Solution Manager Ok… so, What is SAP? ● Developer of Business Applications. ● Applications processing critical business functions. SALESSALES PRODUCTIONPRODUCTION FINANCIAL PLANNINGFINANCIAL PLANNING INVOICINGINVOICING PROCUREMENTPROCUREMENT TREASURYTREASURY LOGISTICSLOGISTICS PAYROLLPAYROLL BILLINGBILLING HUMAN RESOURCESHUMAN RESOURCES BIBI BWBW SCMSCM ERPERP PIPI CRMCRM SMSM BOBO SRMSRM PLMPLMPORTALPORTAL GRCGRC
  • 9. 9www.onapsis.com – © 2012 Onapsis , Inc. – All rights reservedAttacks on SAP Solution Manager A Business-Critical Infrastructure ● ERP systems store and process the most critical business information in the Organization. ● If the SAP platform is breached, an intruder would be able to perform different attacks such as: ESPIONAGE: Obtain customers/vendors/human resources data, financial planning information, balances, profits, sales information, manufacturing recipes, etc. SABOTAGE: Paralyze the operation of the organization by shutting down the SAP system, disrupting interfaces with other systems and deleting critical information, etc. FRAUD: Modify financial information, tamper sales and purchase orders, create new vendors, modify vendor bank account numbers, etc.
  • 10. Over 95% of the SAP systems we evaluated were exposed to espionage, sabotage and fraud cyber attacks. Attackers do not need access credentials to perform these attacks!
  • 11. 11www.onapsis.com – © 2012 Onapsis , Inc. – All rights reservedAttacks to SAP Web Applications The SAPThe SAP Solution ManagerSolution Manager Attacks on SAP Solution Manager
  • 12. 12www.onapsis.com – © 2012 Onapsis , Inc. – All rights reservedAttacks on SAP Solution Manager What is the SAP Solution Manager? ● SAP component required in every SAP implementation. ● Central point for the administration of SAP systems. ● Typically, it is connected to several customer’s SAP systems ● Does not hold any business data, but technical information about customer’s SAP systems. ● Administrators connect to it to manage users, incidents, download and apply patches, among other activities. If an attacker breaks into the SolMan, all the connected systems can be ultimately compromised!
  • 13. 13www.onapsis.com – © 2012 Onapsis , Inc. – All rights reservedAttacks on SAP Solution Manager SAP SolMan Infrastructure DEV QA PRD
  • 14. 14www.onapsis.com – © 2012 Onapsis , Inc. – All rights reservedAttacks on SAP Solution Manager
  • 15. 15www.onapsis.com – © 2012 Onapsis , Inc. – All rights reservedAttacks on SAP Solution Manager The Initial Compromise If not compliant with BIZEC TEC/11, an anonymous attacker could easily compromise a satellite SAP system. ● BIZEC TEC-01: Vulnerable Software in Use ● BIZEC TEC-02: Standard Users with Default Passwords ● BIZEC TEC-03: Unsecured SAP Gateway ● BIZEC TEC-04: Unsecured SAP/Oracle authentication ● BIZEC TEC-05: Insecure RFC interfaces ● BIZEC TEC-06: Insufficient Security Audit Logging ● BIZEC TEC-07: Unsecured SAP Message Server ● BIZEC TEC-08: Dangerous SAP Web Applications ● BIZEC TEC-09: Unprotected Access to Administration Services ● BIZEC TEC-10: Insecure Network Environment ● BIZEC TEC-11: Unencrypted Communications
  • 16. 16www.onapsis.com – © 2012 Onapsis , Inc. – All rights reservedAttacks on SAP Solution Manager The Initial Compromise If not compliant with BIZEC TEC/11, an anonymous attacker could easily compromise a satellite SAP system. ● BIZEC TEC-01: Vulnerable Software in Use ● BIZEC TEC-02: Standard Users with Default Passwords ● BIZEC TEC-03: Unsecured SAP Gateway ● BIZEC TEC-04: Unsecured SAP/Oracle authentication ● BIZEC TEC-05: Insecure RFC interfaces ● BIZEC TEC-06: Insufficient Security Audit Logging ● BIZEC TEC-07: Unsecured SAP Message Server ● BIZEC TEC-08: Dangerous SAP Web Applications ● BIZEC TEC-09: Unprotected Access to Administration Services ● BIZEC TEC-10: Insecure Network Environment ● BIZEC TEC-11: Unencrypted Communications
  • 17. 17www.onapsis.com – © 2012 Onapsis , Inc. – All rights reservedAttacks on SAP Solution Manager The Initial Compromise If not compliant with BIZEC TEC/11, an anonymous attacker could easily compromise a satellite SAP system. ● BIZEC TEC-01: Vulnerable Software in Use ● BIZEC TEC-02: Standard Users with Default Passwords ● BIZEC TEC-03: Unsecured SAP Gateway ● BIZEC TEC-04: Unsecured SAP/Oracle authentication ● BIZEC TEC-05: Insecure RFC interfaces ● BIZEC TEC-06: Insufficient Security Audit Logging ● BIZEC TEC-07: Unsecured SAP Message Server ● BIZEC TEC-08: Dangerous SAP Web Applications ● BIZEC TEC-09: Unprotected Access to Administration Services ● BIZEC TEC-10: Insecure Network Environment ● BIZEC TEC-11: Unencrypted Communications
  • 18. 18www.onapsis.com – © 2012 Onapsis , Inc. – All rights reservedAttacks on SAP Solution Manager The Initial Compromise If not compliant with BIZEC TEC/11, an anonymous attacker could easily compromise a satellite SAP system. ● BIZEC TEC-01: Vulnerable Software in Use ● BIZEC TEC-02: Standard Users with Default Passwords ● BIZEC TEC-03: Unsecured SAP Gateway ● BIZEC TEC-04: Unsecured SAP/Oracle authentication ● BIZEC TEC-05: Insecure RFC interfaces ● BIZEC TEC-06: Insufficient Security Audit Logging ● BIZEC TEC-07: Unsecured SAP Message Server ● BIZEC TEC-08: Dangerous SAP Web Applications ● BIZEC TEC-09: Unprotected Access to Administration Services ● BIZEC TEC-10: Insecure Network Environment ● BIZEC TEC-11: Unencrypted Communications
  • 19. 19www.onapsis.com – © 2012 Onapsis , Inc. – All rights reservedAttacks to SAP Web Applications SAP SolMan RFC Connections ● RFC connections to and from the Solution Manager created by default ● TRUSTED connections imply a trust relationship (a user with S_RFCACL authorization is required) ● BACK connections imply access from satellite systems to Solution Manager. ● Connections with stored password can be used to do remote logons or remotely execute RFC “remote-enabled” function modules. Attacks on SAP Solution Manager RFC Destination SM_<SID>CLNT<Client>_LOGIN SM_<SID>CLNT<Client>_READ SM_<SID>CLNT<Client>_TRUSTE D SM_<SID>CLNT<Client>_TMW SM_<SID>CLNT<Client>_BACK
  • 20. 20www.onapsis.com – © 2012 Onapsis , Inc. – All rights reservedAttacks to SAP Web Applications Abuse of default RFC connections Attacks on SAP Solution Manager ● Remote Logon Using SAP GUI
  • 21. 21www.onapsis.com – © 2012 Onapsis , Inc. – All rights reservedAttacks to SAP Web Applications Abuse of default RFC connections Attacks on SAP Solution Manager Non interactive user? ●Remote Execution of RFC Function Modules
  • 22. 22www.onapsis.com – © 2012 Onapsis , Inc. – All rights reservedAttacks to SAP Web ApplicationsAttacks on SAP Solution Manager
  • 23. 23www.onapsis.com – © 2012 Onapsis , Inc. – All rights reservedAttacks to SAP Web ApplicationsAttacks on SAP Solution Manager
  • 24. 24www.onapsis.com – © 2012 Onapsis , Inc. – All rights reservedAttacks to SAP Web ApplicationsAttacks on SAP Solution Manager
  • 25. 25www.onapsis.com – © 2012 Onapsis , Inc. – All rights reservedAttacks to SAP Web Applications SAP SolMan and Gateway attacks ● SAP Solution Manager is highly dependent on the Gateway: several external servers are registered by default. ● If the attacker knows/can guess the TPNAME, and the Gateway is not protected (by default), then all the well-known Gateway attacks can be triggered: ● RFC callback attacks. ● Cancellation of required external servers (DoS). ● Man-in-the-middle attacks through RFC. No sensitive business data, but technical information, useful for other attacks, can be intercepted (and modified). Attacks on SAP Solution Manager
  • 26. 26www.onapsis.com – © 2012 Onapsis , Inc. – All rights reservedAttacks to SAP Web Applications SAP SolMan and Gateway attacks ● SAP Solution Manager is highly dependent on the Gateway: several external servers are registered by default. ● If the attacker knows/can guess the TPNAME, and the Gateway is not protected (by default), then all the well-known Gateway attacks can be triggered: ● RFC callback attacks. ● Cancellation of required external servers (DoS). ● Man-in-the-middle attacks through RFC. No sensitive business data, but technical information, useful for other attacks, can be intercepted (and modified). Attacks on SAP Solution Manager Protection / Countermeasure  Restrict the assignment of user authorizations to logon from trusted systems (S_RFCACL and S_RFC).  Use authorization object S_ICF on calling systems, controlling who can use which RFC destination.  Restrict who can access RFC destinations by transaction (SM59), by table (RFCDES) and by authorization object (S_RFC_ADM).  Restrict authorization object S_DEVELOP with activity 16 (execute) to control who can test function modules using SE37.
  • 27. 27www.onapsis.com – © 2012 Onapsis , Inc. – All rights reservedAttacks to SAP Web Applications SAP SolMan and Gateway attacks ● SAP Solution Manager is highly dependent on the Gateway: several external servers are registered by default. ● If the attacker knows/can guess the TPNAME, and the Gateway is not protected (by default), then all the well-known Gateway attacks can be triggered: ● RFC callback attacks. ● Cancellation of required external servers (DoS). ● Man-in-the-middle attacks through RFC. No sensitive business data, but technical information, useful for other attacks, can be intercepted (and modified). Attacks on SAP Solution Manager Protection / Countermeasure  Protect and enforce security on ALL SAP systems (SB,DEV,QA…) as the productive system.  Do not focus authorization checks on Dialog users.  Check the “References” slide for more information!
  • 28. 28www.onapsis.com – © 2012 Onapsis , Inc. – All rights reservedAttacks to SAP Web Applications SAP Central UserSAP Central User AdministrationAdministration (CUA)(CUA) Attacks on SAP Solution Manager
  • 29. 29www.onapsis.com – © 2012 Onapsis , Inc. – All rights reservedAttacks to SAP Web Applications Central User Administration (CUA) ● The CUA Parent system needs to be allowed to create and administrate users on every Child system. ● It allows SAP administrators to easily manage users of ALL the SAP systems from a single point. ● Useful for ABAP and J2EE systems integration. Attacks on SAP Solution Manager CUA enables the administration of users from a central SAP system (usually the SolMan).
  • 30. 30www.onapsis.com – © 2012 Onapsis , Inc. – All rights reservedAttacks to SAP Web Applications Central User Administration (CUA) Attacks on SAP Solution Manager http://help.sap.com/saphelp_nw73/helpdata/en/a9/1a1ba3db9343beb2723452255003c5/content.htm ● RFC Connections are created: ● From Parent to Child system (Trusted) ● From Child to Parent system (Normal)
  • 31. 31www.onapsis.com – © 2012 Onapsis , Inc. – All rights reservedAttacks to SAP Web Applications Attacks on Central User Administration ● If the CUA Parent (usually the SolMan) is compromised, arbitrary users with any profiles can be created in all satellite systems. ● Note: Common RFC function modules used to create users do not work neither on child or parent systems when CUA is enabled  Other set of functions need to be used (the ones used by CUA itself). Attacks on SAP Solution Manager
  • 32. 32www.onapsis.com – © 2012 Onapsis , Inc. – All rights reservedAttacks to SAP Web Applications Attacks on Central User Administration ● If the CUA Parent (usually the SolMan) is compromised, arbitrary users with any profiles can be created in all satellite systems. ● Note: Common RFC function modules used to create users do not work neither on child or parent systems when CUA is enabled  Other set of functions need to be used (the ones used by CUA itself). Attacks on SAP Solution Manager
  • 33. 33www.onapsis.com – © 2012 Onapsis , Inc. – All rights reservedAttacks to SAP Web Applications Attacks on Central User Administration ● If the CUA Parent (usually the SolMan) is compromised, arbitrary users with any profiles can be created in all satellite systems. ● Note: Common RFC function modules used to create users do not work neither on child or parent systems when CUA is enabled  Other set of functions need to be used (the ones used by CUA itself). Attacks on SAP Solution Manager Protection / Countermeasure  Restrict the usage of CUA RFC destinations for user administrators only, by using authorization object S_ICF on the CUA master.  Use a special client within the SolMan to run the CUA master.
  • 34. 34www.onapsis.com – © 2012 Onapsis , Inc. – All rights reservedAttacks to SAP Web Applications SAP ComputingSAP Computing Center ManagementCenter Management System (CCMS)System (CCMS) Attacks on SAP Solution Manager
  • 35. 35www.onapsis.com – © 2012 Onapsis , Inc. – All rights reservedAttacks to SAP Web Applications SAP CCMS ● Monitoring infrastructure provided by SAP to monitor SAP Application Servers. It can be configured centrally, using a central server (CEN) defined to receive all alerts. ● An AGENT is required to be executed on each monitored server. The agent : ● Is implemented as an RFC server, which exposes several functions. ● Registers itself as an EXTERNAL SERVER in the CEN, with a specific TPNAME (following a well-known pattern). ● Is running as <SID>adm  Any abuse or exploitation would imply a full compromise of the SAP system information. Attacks on SAP Solution Manager
  • 36. 36www.onapsis.com – © 2012 Onapsis , Inc. – All rights reservedAttacks on SAP Solution Manager SAP CCMS Infrastructure DEV QA PRD In many cases the Solution Manager is used as the CCMS Central Server (CEN), receiving information from all managed systems.
  • 37. 37www.onapsis.com – © 2012 Onapsis , Inc. – All rights reservedAttacks to SAP Web Applications SAP CCMS RFC Connections ● RFC Connections from the CEN are created by default ● The COLLECT destination has stored logon data and can be used to remotely execute function modules in the monitored systems. ● The ANALYZE destination is typically used with a highly-privileged user, but has no stored logon information. ● Additionally, the agent connects back to the CEN using the CMSREG user, whose credentials are stored in a local file in the agent system (/usr/sap/SID/INSTANCE/log/sapccm4x/passwd). Attacks on SAP Solution Manager RFC Destination <SID>_RZ20_COLLECT <SID>_RZ20_ANALYZE
  • 38. 38www.onapsis.com – © 2012 Onapsis , Inc. – All rights reservedAttacks to SAP Web Applications Attacks on the SAP CCMS Agent ● One of the functions exposed by the CCMS agent can be used to execute OS commands remotely without authentication. ● As the agent is executed with SIDadm privileges  An attacker could get full compromise of the monitored SAP System going through the CEN’s gateway. Attacks on SAP Solution Manager
  • 39. 39www.onapsis.com – © 2012 Onapsis , Inc. – All rights reservedAttacks to SAP Web Applications Attacks on the SAP CCMS Agent ● One of the functions exposed by the CCMS agent can be used to execute OS commands remotely without authentication. ● As the agent is executed with SIDadm privileges  An attacker could get full compromise of the monitored SAP System going through the CEN’s gateway. Attacks on SAP Solution Manager Protection / Countermeasure Solution: Apply SAP Security Note 1758450  Mitigation: Secure the SAP Gateway, only allowing connections from authorized systems to the CCMS agents working as registered servers.
  • 40. 40www.onapsis.com – © 2012 Onapsis , Inc. – All rights reservedAttacks to SAP Web Applications SAP Solution ManagerSAP Solution Manager Diagnostics (SMD)Diagnostics (SMD) Attacks on SAP Solution Manager
  • 41. 41www.onapsis.com – © 2012 Onapsis , Inc. – All rights reservedAttacks to SAP Web Applications SAP SMD ● “Solution Manager Diagnostics provides all functionality to centrally analyze and monitor a complete NetWeaver system landscape”. ● An AGENT is required to be executed on each monitored server. The agent : ● Is developed in JAVA and installed as a new SAP system (typically using a high system number like 97 or 98). ● Exposes an anonymous P4 interface with a reduced set of methods. ● Connects back to the Solution Manager, using a highly-privileged user account. Attacks on SAP Solution Manager
  • 42. 42www.onapsis.com – © 2012 Onapsis , Inc. – All rights reservedAttacks to SAP Web Applications Abuse of SMD stored credentials ● If a monitored system is compromised, the credentials of the user used for the connection can be decrypted (kudos to Jordan Santarsieri @Onapsis). ● Using these credentials, an attacker can connect back to the Solution Manager with high privileges. ● Once logged to the Solution Manager, the compromise can be extended by using default RFC connections to all managed/satellite systems. Attacks on SAP Solution Manager
  • 43. 43www.onapsis.com – © 2012 Onapsis , Inc. – All rights reservedAttacks to SAP Web Applications Abuse of SMD stored credentials ● If a monitored system is compromised, the credentials of the user used for the connection can be decrypted (kudos to Jordan Santarsieri @Onapsis). ● Using these credentials, an attacker can connect back to the Solution Manager with high privileges. ● Once logged to the Solution Manager, the compromise can be extended by using default RFC connections to all managed/satellite systems. Attacks on SAP Solution Manager Protection / Countermeasure  Avoid the initial compromise of SAP system running the SMD agent.  Restrict access to the secure storage file at the file-system level.
  • 44. 44www.onapsis.com – © 2012 Onapsis , Inc. – All rights reservedAttacks to SAP Web Applications Abuse of SMD P4 interface ● Once the SMD agent is installed, the P4 interface is exposed on TCP service 5XX04 (instance num. XX). ● The P4 interface configured in the SMD agent is exposing a method that allows the installation of an application in the SMD agent, leading to remote OS command execution. ● Commands are executed as the <SID>adm user (daaadm, smdadm…) ● This leads to a full compromise of any SAP system configured on the Application Server. Attacks on SAP Solution Manager
  • 45. 45www.onapsis.com – © 2012 Onapsis , Inc. – All rights reservedAttacks to SAP Web Applications Abuse of SMD P4 interface ● Once the SMD agent is installed, the P4 interface is exposed on TCP service 5XX04 (instance num. XX). ● The P4 interface configured in the SMD agent is exposing a method that allows the installation of an application in the SMD agent, leading to remote OS command execution. ● Commands are executed as the <SID>adm user (daaadm, smdadm…) ● This leads to a full compromise of any SAP system configured on the Application Server. Attacks on SAP Solution Manager
  • 46. 46www.onapsis.com – © 2012 Onapsis , Inc. – All rights reservedAttacks to SAP Web Applications Abuse of SMD P4 interface ● Once the SMD agent is installed, the P4 interface is exposed on TCP service 5XX04 (instance num. XX). ● The P4 interface configured in the SMD agent is exposing a method that allows the installation of an application in the SMD agent, leading to remote OS command execution. ● Commands are executed as the <SID>adm user (daaadm, smdadm…) ● This leads to a full compromise of any SAP system configured on the Application Server. Attacks on SAP Solution Manager Protection / Countermeasure Solution: Apply SAP Security Note 1774568 Mitigation: Follow SAP recommendations and restrict access to P4 interface in SAP systems, as potentially insecure services might be exposed.
  • 47. 47www.onapsis.com – © 2012 Onapsis , Inc. – All rights reservedAttacks to SAP Web Applications ConclusionsConclusions Attacks on SAP Solution Manager
  • 48. 48www.onapsis.com – © 2012 Onapsis , Inc. – All rights reservedAttacks to SAP Web Applications Conclusions ● If an attacker breaks into the SAP Solution Manager, the game is over: he would be able to compromise all managed satellite systems. ● Trust relationships are necessary in most SAP implementations. Extra caution: ● Which users can log-in using this feature (S_RFCACL). ● Which authorizations are being granted to these users. ● RFC connections are necessary in all SAP implementations. Whenever possible: ● Use encryption (SNC). It should be mandatory for business related communications. ● Avoid using connections with stored credentials. ● Avoid using connections from systems with lower security classification to systems with higher security classification (DEV  PRD!) ● Monitor the creation/management of RFC connections, as one single connection from DEV  PRD could result in a full system compromise if exploited. Attacks on SAP Solution Manager
  • 49. 49www.onapsis.com – © 2012 Onapsis , Inc. – All rights reservedAttacks to SAP Web Applications ● If possible, use different Solution Manager/CEN systems for Production environments. ● Secure the Solution Manager as ANY other Productive System ● Secure all satellite systems managed by an SAP Solution Manager: ● Segregation of Duties (SoD) is really necessary, but not enough. ● Implement a secure technical configuration of satellite systems. ● Perform continuous/automated security monitoring. ● Do not expose the Solution Manager to the Internet! ● Restrict network access to the SAP Systems. Use firewalls/network filters to restrict potentially insecure interfaces. ● Update the systems, use the latest versions of all SAP solutions and apply all relevant SAP Security Notes. Attacks on SAP Solution Manager Conclusions
  • 50. 50www.onapsis.com – © 2012 Onapsis , Inc. – All rights reservedAttacks to SAP Web Applications 1. Additional Information about Gateway and RFC security - Secure Configuration SAP NetWeaver Application Server ABAP” https://websmp109.sap-ag.de/~sapdownload/011000358700000968282010E/SAP-Sec-Rec.pdf 2. Best Practice - How to analyze and secure RFC connections http://wiki.sdn.sap.com/wiki/display/Security/Best+Practice+-+How+to+analyze+and+secure+RFC+connections 3. RFC/ICF Security Guide http://help.sap.com/saphelp_nw73ehp1/helpdata/en/48/92486caa6b17cee10000000a421937/frameset.htm 4. Security Settings in the SAP Gateway http://help.sap.com/saphelp_nw73ehp1/helpdata/en/48/b2096e7895307be10000000a42189b/frameset.htm 5. Securing RFC Connections http://scn.sap.com/docs/DOC-17089 6. Security Guide for Connectivity with the AS Java http://help.sap.com/saphelp_nw73ehp1/helpdata/en/b3/17d13fa69a4921e10000000a1550b0/frameset.htm 7. SolMan Security Guide: http://service.sap.com/~form/sapnet? _SHORTKEY=01100035870000735220&_OBJECT=011000358700000482312011E 8. Onapsis X1 http://www.onapsis.com/x1 Attacks on SAP Solution Manager References
  • 51. 51www.onapsis.com – © 2012 Onapsis , Inc. – All rights reservedAttacks to SAP Web Applications Questions?Questions? Follow us! @onapsis @jp_pereze Attacks on SAP Solution Manager jppereze@onapsis.comjppereze@onapsis.com
  • 52. 52www.onapsis.com – © 2012 Onapsis , Inc. – All rights reservedAttacks on SAP Solution Manager Thank you!Thank you!