Главная
Study mode:
on
1
Intro
2
Introduction - Solman
3
Introduction - SMDAgent
4
Why ? - First contact
5
Why ? - SAP Secure Storage
6
Authentication bypass - P4 Service
7
Authentication bypass - Key
8
Authentication bypass - Timestamp token
9
Authentication bypass - Start time
10
Authentication bypass - Attack P4S
11
OS command injection
12
Tamper the SOLMAN Security Report
13
Recommendations
14
Conclusion
Description:
Explore SAP security vulnerabilities and attack vectors in this comprehensive conference talk from Hack In The Box Security Conference. Dive deep into SAP Applications, SAP Solution Manager (SOLMAN), and SAP SMDAgent as the presenter uncovers authentication bypass techniques, OS command whitelist bypasses, and privilege escalation methods. Learn how attackers can exploit these vulnerabilities to gain unauthorized access, execute arbitrary commands, and potentially compromise entire SAP landscapes. Witness live demonstrations of full-chain attacks and the manipulation of SOLMAN security reports. Gain valuable insights into mitigation strategies, including patch details and configuration recommendations, to protect SAP environments against these threats. Benefit from the presenter's extensive SAP security experience and research, covering critical CVEs and best practices for addressing cybersecurity across SAP Applications in the enterprise.

SAP RCE - The Agent Who Spoke Too Much

Hack In The Box Security Conference
Add to list
0:00 / 0:00