Attacking the Giants: Exploiting SAP Internals - Cybsec
Attacking the Giants: Exploiting SAP Internals - Cybsec
Attacking the Giants: Exploiting SAP Internals - Cybsec
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
<strong>Attacking</strong> <strong>the</strong> <strong>Giants</strong>: <strong>Exploiting</strong> <strong>SAP</strong> <strong>Internals</strong><br />
Advanced Attacks<br />
© 2007<br />
Evil Twin illustrated…<br />
RESPONSE<br />
ID=REG1<br />
RCF Call<br />
<strong>SAP</strong> GW<br />
ID=REG1<br />
<strong>SAP</strong> R/3<br />
- Legimate An Now, external <strong>the</strong> External same RFC malicious RFC Server client/server registers connects at appears <strong>SAP</strong> R/3 with in Gateway. <strong>the</strong><br />
-scene... <strong>SAP</strong> Innocent R/3 Gateway, (don’t lamb connection be registering afraid, establishment...<br />
it’s itself controlled) with <strong>the</strong> same ID as <strong>the</strong><br />
-original Client The attacker performs external connects RFC server call with and <strong>the</strong> Server original answers RFC server, politely.<br />
-preventing All future him connections from serving to <strong>the</strong> requests REG1 from server o<strong>the</strong>r will clients. be attended<br />
by <strong>the</strong> evil one.<br />
External RFC<br />
Malicius Server<br />
37