19.06.2015 Views

Attacking the Giants: Exploiting SAP Internals - Cybsec

Attacking the Giants: Exploiting SAP Internals - Cybsec

Attacking the Giants: Exploiting SAP Internals - Cybsec

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

<strong>Attacking</strong> <strong>the</strong> <strong>Giants</strong>: <strong>Exploiting</strong> <strong>SAP</strong> <strong>Internals</strong><br />

Advanced Attacks<br />

© 2007<br />

Evil Twin illustrated…<br />

RESPONSE<br />

ID=REG1<br />

RCF Call<br />

<strong>SAP</strong> GW<br />

ID=REG1<br />

<strong>SAP</strong> R/3<br />

- Legimate An Now, external <strong>the</strong> External same RFC malicious RFC Server client/server registers connects at appears <strong>SAP</strong> R/3 with in Gateway. <strong>the</strong><br />

-scene... <strong>SAP</strong> Innocent R/3 Gateway, (don’t lamb connection be registering afraid, establishment...<br />

it’s itself controlled) with <strong>the</strong> same ID as <strong>the</strong><br />

-original Client The attacker performs external connects RFC server call with and <strong>the</strong> Server original answers RFC server, politely.<br />

-preventing All future him connections from serving to <strong>the</strong> requests REG1 from server o<strong>the</strong>r will clients. be attended<br />

by <strong>the</strong> evil one.<br />

External RFC<br />

Malicius Server<br />

37

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!