Главная
Study mode:
on
1
Intro
2
2 ERP Scan
3
Enterprise applications: Definitions
4
Business-critical systems architecture
5
Secure corporate network
6
Corporate network attack scenario
7
SSRF History: Basics
8
SSRF history: World research
9
Trusted SSRF: Oracle Database
10
SSRF Types: SAP
11
Remote SSRF: Subtypes
12
Simple Remote SSRF: Login bruteforce
13
XXE Attacks on other services
14
Full Remote SSRF
15
Remote SSRF threats
16
XXE Tunneling to Verb Tampering
17
XXE Tunneling to Buffer Overflow (Hint 2)
18
XXE Tunneling to Buffer Overflow: Packet B
19
XXE Tunneling to Buffer Overflow (Hint 3)
20
XXE Tunneling to Rsh
21
Bypass SAP security restrictions
22
SAP Gateway server security bypass: Exploit
23
SAP Message Server security bypass
24
Oracle DB security bypass
25
Conclusion?
26
Purpose
27
How is it working?
28
Few steps
29
Action: Test
30
Action: Scan
31
Action: Attack
32
DEMO
Description:
Explore a comprehensive analysis of Server Side Request Forgery (SSRF) attacks and their impact on business-critical applications in this Black Hat USA 2012 conference talk. Delve into the intricacies of SSRF vulnerabilities, with a focus on XXE Tunneling, and learn how these techniques can bypass multiple layers of security defenses. Discover how attackers can exploit trusted sources to compromise secured systems, using SAP as a practical example. Examine various SSRF vulnerabilities that enable internal network port scanning, unauthorized HTTP requests, and backend bruteforcing. Gain insights into the powerful XXE Tunneling technique and its potential to reopen old attack vectors and create new ones in business-critical systems. Learn about the OWASP-EAS project's XXEScanner tool, designed to gather critical information, perform scans, and execute attacks on vulnerable hosts or backends. Understand the implications of these attacks on enterprise resource planning (ERP) systems, portals, business intelligence platforms, and industrial control systems. Read more

SSRF vs Business Critical Applications

Black Hat
Add to list