Onapsis at Black Hat Virtual Conference 2020
Protect your mission-critical applications
August 1-6, 2020
Black Hat USA is the world’s leading information security event, where attendees have the opportunity to discuss and discover leading trends, threats and research in cybersecurity.
ERP systems are at the core of every business, but their security has traditionally been taken for granted and have been out of InfoSec’s purview. Join us at Black Hat 2020 to learn more about including ERP security in your overall IT security strategy so your critical systems and business applications stay secure, compliant and available.
Stop by our Virtual Booth to see a live demo of The Onapsis Platform, learn about key trends affecting mission-critical applications or chat with one of our cybersecurity experts.
Onapsis Led Session
An Unauthenticated Journey to Root:
Pwning Your Company's Enterprise Software Servers
Date: Wednesday August 5th, 2020
Time: 11:00 - 11:40 AM
Often Fortune 1000 companies consist of a plethora of software, hardware, vendors and solutions all operating to keep the business running and alive. With all this complexity, there is often a single vendor that's common amongst them all: SAP.
SAP's software relationship with the enterprise is well established, often responsible for processing billions of dollars, but with such a vital role in business, what would the impact be if serious flaws were exploited?
At the heart of every SAP deployment there is always one core mandatory product that's connected to many other systems: The SAP Solution Manager (SolMan). Think of this as what Active Directory is for Windows networks.
Given the criticality of this component, the Onapsis Research Labs conducted a thorough security assessment of SolMan to understand the threat model, how attackers could compromise it and how customers should protect themselves. The results were overwhelming. From unauthenticated HTTP access, an attacker would be able to compromise all systems in the SAP landscape. Furthermore, chaining a series of vulnerabilities, it would be possible to get reliable root access not only in the attacked core system, but also in all satellites connected to it.
The aim of this presentation is to show the journey we took while researching SolMan, a journey that included binary and Java application analysis, understanding how SolMan worked as well as how we identified exploitation methods that could be used by rogue parties to attack it. By talking about this journey, we hope attendees can use our experience to tackle similar projects where little, or no, information is available about how complex components work.
Finally, we'll explain in detail, not only how these issues were fixed by SAP, but also what you can do in terms of detecting and preventing these kinds of threats at your organization.
Security Researcher, Onapsis
Senior Security Researcher, Onapsis