BlackHat EU 2010 Di Croce SAP Backdoors Slides
BlackHat EU 2010 Di Croce SAP Backdoors Slides
BlackHat EU 2010 Di Croce SAP Backdoors Slides
Disclaimer
This publication is copyright Onapsis SRL 2010 All rights reserved. This publication contains references to the products of SAP AG. SAP, R/3, xApps, xApp, SAP NetWeaver, Duet, PartnerEdge, ByDesign, SAP Business ByDesign, and other SAP products and services mentioned herein are trademarks or registered trademarks of SAP AG in Germany and in several other countries all over the world. Business Objects and the Business Objects logo, BusinessObjects, Crystal Reports, Crystal Decisions, Web Intelligence, Xcelsius and other Business Objects products and services mentioned herein are trademarks or registered trademarks of Business Objects in the United States and/or other countries. SAP AG is neither the author nor the publisher of this publication and is not responsible for its content, and SAP Group shall not be liable for errors or omissions with respect to the materials.
Who is Onapsis?
Specialized company focused in the Security of Business-critical Applications (SAP, Siebel, Oracle E-Business SuiteTM, JD Edwards ). Core business areas: Development of specialized security software solutions. Security consultancy services. Trainings on business-critical systems security.
Who am I?
Director of Research and Development at Onapsis. Degree in Computer System Engineering. Originally devoted to Penetration Testing and Vulnerability Research. Discovered vulnerabilities in Microsoft, Oracle, SAP, IBM, Speaker/Trainer at Black Hat, HITB, Sec-T, Hack.lu, DeepSec, Ekoparty..
SAP Backdoors Presentation www.onapsis.com Onapsis S.R.L. 2010 All rights reserved 3
Agenda
Introduction A Ghost in the User Master Backdoors in SAP Business Modules Backdoors in the Authentication Procedure Onapsis Integrity Analyzer for SAP Conclusions
Introduction
What is SAP?
Largest provider of business management solutions in the world. More than 140.000 implementations around the globe. More than 90.000 customers in 120 countries. Used by Fortune-500 world-wide companies, governmental organizations and defence facilities to run their every-day business processes. Such as Revenue / Production / Expenditure business cycles.
FINANCIAL PLANNING
TREASURY
PAYROLL
LOGISTICS
SALES
SAP Backdoors Presentation
INVOICING
PRODUCTION
PROCUREMENT
BILLING
6
Backdoor special methods that are implemented in an information system, usually after an unauthorized compromise, with the purpose of securing future access to the system while attempting to remain undetected.
10
SAP Business Application Layer SAP IT Application Layer Database Layer Operating System Layer
11
12
13
14
3 4
Live demo
17
Protection / Countermeasure
Monitor the value of the specified profile parameter to detect insecure values. Implement a dedicated authorization group for U* tables. Check SAP Note 1023437.
18
19
Developments and changes can only be done in the DEV system. The PRD system is configured to block any attempt to modify programs directly in the system. Through this procedure, it is expected that the quality and availability of the SAP production systems is maximized.
SAP Backdoors Presentation www.onapsis.com Onapsis S.R.L. 2010 All rights reserved 21
Live demo
24
25
27
Live demo
28
Protection / Countermeasure
Its not possible to detect and protect against backdoors from within the SAP system itself. External tools are needed.
29
30
32
Live demo
33
Conclusions
34
The only sustainable choice the industry faces is the objective and responsible analysis of this threat.
35
36
References
37
References
[1] http://www.onapsis.com/research/slides/ONAPSIS-Penetration_Testing_SAP.pdf [2] http://www.onapsis.com/resources/get.php?resid=ssid01
38
Questions?
[email protected]
39
Thank you!
www.onapsis.com
40