Overview
Explore SAP security vulnerabilities and attack vectors in this comprehensive conference talk from Hack In The Box Security Conference. Dive deep into SAP Applications, SAP Solution Manager (SOLMAN), and SAP SMDAgent as the presenter uncovers authentication bypass techniques, OS command whitelist bypasses, and privilege escalation methods. Learn how attackers can exploit these vulnerabilities to gain unauthorized access, execute arbitrary commands, and potentially compromise entire SAP landscapes. Witness live demonstrations of full-chain attacks and the manipulation of SOLMAN security reports. Gain valuable insights into mitigation strategies, including patch details and configuration recommendations, to protect SAP environments against these threats. Benefit from the presenter's extensive SAP security experience and research, covering critical CVEs and best practices for addressing cybersecurity across SAP Applications in the enterprise.
Syllabus
Intro
Introduction - Solman
Introduction - SMDAgent
Why ? - First contact
Why ? - SAP Secure Storage
Authentication bypass - P4 Service
Authentication bypass - Key
Authentication bypass - Timestamp token
Authentication bypass - Start time
Authentication bypass - Attack P4S
OS command injection
Tamper the SOLMAN Security Report
Recommendations
Conclusion
Taught by
Hack In The Box Security Conference