SlideShare une entreprise Scribd logo
1  sur  68
Télécharger pour lire hors ligne
Invest in security
to secure investments



How I will break your enterprise:
ESB Security and more

Alexander Polyakov

CTO at ERPScan (Digital Security)

November 19, 2012
Me




Business application
  security expert
The question




How to break a secure enterprise network?
Hint




What do we do if we have a secure target website
                 on a hosting?
Answer


• We can do the same for companies
• Just Google for the target company
  suppliers and customers
• Pwn one of them
• Find a link to the secured company
But how?

• Almost all big companies are connected to each other
• To make their business work
• For example, companies generate automatic Payment Orders
  from one business application to another
• They use some kind of middleware to do this
• Sometimes, those systems can be open to the Internet
• Mostly not
• But they must be open for partners
• What kind of systems are u talking about?
Enterprise Service Bus
ESB
What they look like
What do we know about their security?


• Nothing
  – Actually, very little info
• They can have vulnerabilities
  – A lot of vulnerabilities
• Because they are complex
  – Very complex
• And very customized
  – Because it’s more of a framework than software
Some ESB problems


ESB is all about DATA
• Missing encryption
  – Not so easy to configure, so mostly unencrypted
  – A lot of swag data transferring
• Support for a lot of interfaces and protocols
  – Many points of failure
  – Can be used as a proxy to attack other systems


And, of course, all the other software security problems
If we attack ESB from a connected company


• We have one bonus
• As we have already pwn’d the connected
  company
• We have auth data to connect to ESB
  interfaces
• But our goal is to jump through ESB to the
  target company
IBM Web Sphere MQ


• IBM Web Sphere MQ
• Middleware application for handling messaging within an enterprise
  network
• The first ESB that was publicly researched for vulnerabilities (in 2007)
• A great presentations by MWRLab
• Whitepaper with 87 pages of MQ insights!
• http://labs.mwrinfosecurity.com/assets/141/mwri_websphere
  -mq-security-white-paper-part1_2008-05-06.pdf
SAP NetWeaver PI


• SAP NetWeaver PI / XI
• Tool for process integration / system integration
• Has SOAP Adapter
• With default services
• We found one that was
        accessible without authorizations
• Accept XML: any XML based attack (Patched by SAP Note 1707494)

                                                   DilbertMSG
• /XISOAPAdapter/servlet/com.sap.aii.af.mp.soap.web.
• More about this later
SAP NetWeaver PI
Microsoft BizTalk



• MS BizTalk
• For the same purpose
• ESB toolkit used to be additional software, but in
  BizTalk 2013, it is integrated
• 0 results for “BizTalk Security” in search engines
• Doesn’t have default services with auth bypass :(
If somebody really used it?
BizTalk map
    Company                              External

   Web-portal                           Suppliers
      HR                               Customers

 Data Warehouse
BizTalk                                    Banks

    Logistics                           Insurance
                    BizTalk
      ERP                                Partners

     Billing                            Branches

                    Picture taken from http://habrahabr.ru/post/94861/
Microsoft BizTalk: how it works

• You send data to a virtual “Input port”
• The port can be anything, from a file to an FTP folder or a web
  service or something else
• BizTalk takes this data and transforms it (Orchestration)
• There are special tools to perform the transformation
• Then the packet is sent to an “Output port”




  So, the simple transformation can have common XML issues
                  depending on the application
Microsoft BizTalk


Different ways to transfer data
  –Simple transfer (Static binding)
  –Bindings (Dynamic binding)
  –Itinerary
BizTalk Transformation example
BizTalk Transformation example


•   The operation is performed by a functoid
•   There are a lot of functoids with math and logical stuff
•   One of the funniest to attack is Database lookup functoid
•   If u find it in some XML, u can connect to external DB’s
•   Sometimes with integrated security (trust)

Provider=msdaora;Data Source=thisdb;Persist Security Info=False;Integrated Security=Yes;


• Also supported: Sybase, Oracle, MySQL, Informix, FoxPro,
  Firebird, Exchange, Excel, DBase, DB2,Access …
BizTalk Binding


Virtual ports must be linked to the real ports they call (binding)
• Static binding. A static port is already configured at the time of
   deployment to use a transport so as to deliver messages to a
   specific external end point. A transport type selects an adapter and
   a URI address.
• Direct binding can also be used to send messages directly into the
   message box. External binding configuration cannot be used with
   directly bound orchestration ports.
• Dynamic Binding. Transport types and locations dynamically
   selected by dynamic ports. The orchestration port is responsible for
   having the required properties created within the message context.
A packet with dynamic binding (any ideas?)
Exploiting dynamic binding easily
BizTalk Binding: use your imagination

•   XPATH
•   STATIC
•   Business Rules Engine (BRE)
•   BRI
•   UDDI
•   UDDI3
•   LDAP
•   MQS
•   FTP
•   FILE
•   .
•   .
•   .
BizTalk Itinerary: full control over the packet

• Itinerary-based routing simplifies the development of
  enterprise-level messaging
• In simple words, an itinerary is a sequence of operations
  performed on a message
• An itinerary consists of the list of services to execute (which
  can contain routing, transformation, and custom services)
  and the configuration information required to resolve the
  metadata necessary to execute each of these services
• For example, it may instruct the service to perform UDDI or
  Business Rules Engine (BRE) lookup for information about a
  specific target end point to which it will route the message


                   A huge area to have fun
Searching for BizTalk applications


•   OK, cool, but how can we find all this stuff?
•   Except sniffing?
•   Answer: UDDI
•   Database of all web services installed on BizTalk
•   Just look for ports 80 or 8080 for /uddi or /uddipublic
•   Add WSDL to URL :)
Bingo - Bongo!
And one more thing: don’t forget about web.config
So, u are inside the
company’s network
    Now what?
Secure corporate network


           Corporate     ERP          Industrial
The                      network      network
           network
Internet
But wait.
There must be some links!
Real corporate network

The
           Corporate    ERP         Industrial
Internet                network
           network                  network
And…
Attackers can use them!
Corporate network attack scenario

The
               Corporate     ERP          Industrial
Internet                     network
               network                    network
But how?
Supa Sexy Robo Fashion
SSRF proxy attack


       Corporate               Secure
       network                 network




  Packet B          Packet B
Packet A
SSRF



• A possibility to use a vulnerable server as a proxy to attack
  other servers located in secure subnetwork
• A way to jump from one subnetwork to another
• A lot of examples of how to run SSRF attack
• We can use any popular business application to run SSRF
• More details about SSRF
   – Part 1 http://erpscan.com/wp-content/uploads/2012/08/SSRF-vs-Businness-critical-
     applications-whitepaper.pdf
   – Part 2 http://erpscan.com/wp-content/uploads/2012/11/SSRF.2.0.poc_.pdf
Exploiting SSRF


  For every SSRF attack, there must be at least 2
  vulnerabilities to successfully trigger the attack:
• First vulnerability
  – Functionality in some service on Server A which allows us to
    send remote packets (for other types of SSRF)
• Second vulnerability
  – Vuln. in service on server B (for remote SSRF )
  – Vuln. in localhost service on server A (for local SSRF)
  – Vuln. in client app. on server A (for back-connect SSRF)
Multiprotocol calls (in XML)

• A lot of XML stuff in ESB
• XML seems to be the new TCP
• Almost all big projects use XML based data transfer
• There are a lot of XML based protocols with different options to
  call external resources and thus conduct SSRF attacks
• There is at least one element type which fits almost all XML
  based schemes. The type is: xsd:anyURI
• URIs also encompass URLs of other schemes (e.g., FTP, gopher,
  telnet), as well as URNs
• Popular URIs: http:// ftp:// telnet:// …..
Multiprotocol calls in XML

• XML
   – XML External Entity
   – XSD definition
• XML Encryption
• XML Signature
• WS-Policy
• From WS-Security
• WS-Addressing
• XBRL
• ODATA (edmx)
   – ODATA External Entity
   – Other
• BPEL
• STRATML
• …….
        Details: http://erpscan.com/wp-content/uploads/2012/11/SSRF.2.0.poc_.pdf
Exploiting Gopher (Example)

<?xml version="1.0" encoding="ISO-8859-1"?>
<!DOCTYPE foo [
<!ELEMENT foo ANY >
<!ENTITY date SYSTEM “gopher://172.16.0.1:3300/AAAAAAAAA" >]>
<foo>&date;</foo>




                      What will happen??
XXE Tunneling (Example)


                                                   Server A (Portal or XI)




POST
/XISOAPAdapter/servlet/com.sap.aii.af.mp.soap.
web.DilbertMSG?format=post HTTP/1.1
Host: 192.168.0.1:8000
                                                 192.168.0.1
<?xml version="1.0" encoding="ISO-8859-1"?>
 <!DOCTYPE foo [
 <!ELEMENT foo ANY >
 <!ENTITY date SYSTEM                                                  AAAAAAAAAAAAA     Server B (ERP,
“gopher://172.16.0.1:3300/AAAAAAAAA" >]>
 <foo>&date;</foo>                                                                       HR, BW etc.)

                                                                                            Port
                                                                                            3300




                            telnet 172.16.0.1 3300
                                                                                       172.16.0.1
XXE Tunneling (Hint 2)

•    Next step is to pack exploit in packet B inside Packet A
•    We need to insert non-printable symbols
•    God bless gopher; it supports urlencode like HTTP
•    It will also help us evade attack against IDS systems


                                         Packet A
POST /XISOAPAdapter/servlet/com.sap.aii.af.mp.soap.web.DilbertMSG?format=post HTTP/1.1
Host: sapserver.com:80
Content-Length: 7730

<?xml version="1.0" encoding="ISO-8859-1"?>
<!DOCTYPE foo [
<!ELEMENT foo ANY >
<!ENTITY date SYSTEM “gopher://[Urlencoded Packet B]" >]>
<foo>&date;</foo>
XXE Tunneling to Buffer Overflow (Result)


                                                    Server A on the
                                                    Internet
                                                    (SAP XI)

POST
/XISOAPAdapter/servlet/com.sap.aii.af.mp.soap.
web.DilbertMSG?format=post HTTP/1.1
Host: sapserver.com:80                                                                  Packet B

<?xml version="1.0" encoding="ISO-8859-1"?>
<!DOCTYPE foo [
<!ELEMENT foo ANY >
<!ENTITY date SYSTEM “gopher://[packetB]"
>]>                                              http://company.com                                Server B in DMZ
<foo>&date;</foo>




                                                                                                                exploit


                                                      Packet C – Command and
                                                      Control response to attacker by                         Shellcode
                                                      DNS protocol, which is allowed                         service with
                                                      for outband connections                                    DNS
                                                                                                               payload

                                                                                                           172.16.0.1
Great, we can jump from one secured
        network to another.
            What’s next?
We are inside, so what?

•   All your systems have password lock policies
•   Because we are in a secure company, rrright?
•   And secure applications send passwords securely
•   While user is authenticating
We are inside, so what?

• All your systems have password lock policies
• Because we are in a secure company, rrright?
• And secure applications send passwords securely

• While user is authenticating!
OK, but what about creating a new
              user?
Create new user, MsSQL
The same applies to when a user is
 changing their password due to
        security policies
Change user password, MsSQL
More than real. 5000 users change
       pass every 90 days
                =>
 Every hour, 2 users change their
           passwords
If we don’t want to wait, we can brute
  until the account is locked, then the
  administrator will unlock it and 99%
             change the pass
Why MsSQL?


• Just because I sometimes want to speak about
  something other than SAP and Oracle, so let it
  be MS
• It’s everybody’s problem
They have the same problems

•   MySQL
•   Oracle console
•   Oracle Enterprise Manager
•   MsSQL Console
•   MsSQL Enterprise Manager
•   etc…
I don’t want user interaction


• We need some kind of user interaction
• But that’s not so tasty
• Let’s look at something else
What about them?




…And 50 more
Issue tracking systems

•   Noh I’m not talking about XSS/SQLI/LFI/OMG/WTF/ETC
•   Of course they exist, but
•   We are in a “very-very secure” company, which has WAF
•   And HTTPS
•   Really secure HTTPS (yes Moxie)
Any ideas? :)
Password change e-mail
Sniff mail requests




Mail requests are unencrypted
Access to the kingdom
So




Because they usually have a wiki
where all the neat stuff is stored,
   like keys to other systems
Questions?
web:    www.dsec.ru
        www.erpscan.com
e-mail: a.polyakov@dsec.ru

Twitter: @sh2kerr

Big thanks to Nikolay Mescherin :)

Contenu connexe

En vedette

TH e-GIF on SOA Using Open Enterprise Architecture
TH e-GIF on SOA Using Open Enterprise ArchitectureTH e-GIF on SOA Using Open Enterprise Architecture
TH e-GIF on SOA Using Open Enterprise ArchitectureThanachart Numnonda
 
Wso2esb sap-jkh-v2.0
Wso2esb sap-jkh-v2.0Wso2esb sap-jkh-v2.0
Wso2esb sap-jkh-v2.0WSO2
 
Geo Enabling Enterprises - Powered by Rolta i Perspective and the WSO2 ESB
Geo Enabling Enterprises - Powered by Rolta i Perspective and the WSO2 ESBGeo Enabling Enterprises - Powered by Rolta i Perspective and the WSO2 ESB
Geo Enabling Enterprises - Powered by Rolta i Perspective and the WSO2 ESBWSO2
 
Integration with SAP using Mule ESB
Integration with SAP using Mule ESBIntegration with SAP using Mule ESB
Integration with SAP using Mule ESBSanjeet Pandey
 
Integrating with SAP FIX and HL7
Integrating with SAP FIX and HL7Integrating with SAP FIX and HL7
Integrating with SAP FIX and HL7WSO2
 
WSO2 ESB - The Fastest Open Source ESB with Superior Integration Capabilities
WSO2 ESB - The Fastest Open Source ESB with Superior Integration CapabilitiesWSO2 ESB - The Fastest Open Source ESB with Superior Integration Capabilities
WSO2 ESB - The Fastest Open Source ESB with Superior Integration CapabilitiesWSO2
 
GreenVulcano ESB Technical Overview (ENG)
GreenVulcano ESB Technical Overview (ENG)GreenVulcano ESB Technical Overview (ENG)
GreenVulcano ESB Technical Overview (ENG)greenvulcano
 
Integrate Your Healthcare Information System Using HL7 Transport with WSO2 ESB
Integrate Your Healthcare Information System Using HL7 Transport with WSO2 ESBIntegrate Your Healthcare Information System Using HL7 Transport with WSO2 ESB
Integrate Your Healthcare Information System Using HL7 Transport with WSO2 ESBWSO2
 
Hybrid Integration with Dynamics CRM Online, Microsoft Azure Service Bus and ...
Hybrid Integration with Dynamics CRM Online, Microsoft Azure Service Bus and ...Hybrid Integration with Dynamics CRM Online, Microsoft Azure Service Bus and ...
Hybrid Integration with Dynamics CRM Online, Microsoft Azure Service Bus and ...Colin Meade
 
WSO2 Intro Webinar - Simplifying Enterprise Integration with Configurable WS...
WSO2 Intro Webinar -  Simplifying Enterprise Integration with Configurable WS...WSO2 Intro Webinar -  Simplifying Enterprise Integration with Configurable WS...
WSO2 Intro Webinar - Simplifying Enterprise Integration with Configurable WS...WSO2
 
Enterprise Integration made easy with WSO2 ESB
Enterprise Integration made easy with WSO2 ESBEnterprise Integration made easy with WSO2 ESB
Enterprise Integration made easy with WSO2 ESBWSO2
 
WSO2Con2011: Using WSO2 ESB with SAP ERP (Retail)
WSO2Con2011: Using WSO2 ESB with SAP ERP (Retail)WSO2Con2011: Using WSO2 ESB with SAP ERP (Retail)
WSO2Con2011: Using WSO2 ESB with SAP ERP (Retail)WSO2
 
ESB Usage Scenarios and Patterns
ESB Usage Scenarios and PatternsESB Usage Scenarios and Patterns
ESB Usage Scenarios and PatternsIBM Sverige
 
A Buyers Guide to an Enterprise Service Bus (ESB)
A Buyers Guide to an Enterprise Service Bus (ESB)A Buyers Guide to an Enterprise Service Bus (ESB)
A Buyers Guide to an Enterprise Service Bus (ESB)WSO2
 
What is an ESB? OPITZ CONSULTING - Winterberg - Trops
What is an ESB? OPITZ CONSULTING - Winterberg - TropsWhat is an ESB? OPITZ CONSULTING - Winterberg - Trops
What is an ESB? OPITZ CONSULTING - Winterberg - TropsOPITZ CONSULTING Deutschland
 
WSO2-ESB - The backbone of Enterprise Integration
WSO2-ESB - The backbone of Enterprise IntegrationWSO2-ESB - The backbone of Enterprise Integration
WSO2-ESB - The backbone of Enterprise IntegrationKasun Indrasiri
 
Introduction to WSO2 Integration Platform
Introduction to WSO2 Integration PlatformIntroduction to WSO2 Integration Platform
Introduction to WSO2 Integration PlatformKasun Indrasiri
 
Service Oriented Architecture (SOA) [2/5] : Enterprise Service Bus
Service Oriented Architecture (SOA) [2/5] : Enterprise Service BusService Oriented Architecture (SOA) [2/5] : Enterprise Service Bus
Service Oriented Architecture (SOA) [2/5] : Enterprise Service BusIMC Institute
 

En vedette (20)

TH e-GIF on SOA Using Open Enterprise Architecture
TH e-GIF on SOA Using Open Enterprise ArchitectureTH e-GIF on SOA Using Open Enterprise Architecture
TH e-GIF on SOA Using Open Enterprise Architecture
 
Sap pi vs_biz_talk
Sap pi vs_biz_talkSap pi vs_biz_talk
Sap pi vs_biz_talk
 
Wso2esb sap-jkh-v2.0
Wso2esb sap-jkh-v2.0Wso2esb sap-jkh-v2.0
Wso2esb sap-jkh-v2.0
 
Geo Enabling Enterprises - Powered by Rolta i Perspective and the WSO2 ESB
Geo Enabling Enterprises - Powered by Rolta i Perspective and the WSO2 ESBGeo Enabling Enterprises - Powered by Rolta i Perspective and the WSO2 ESB
Geo Enabling Enterprises - Powered by Rolta i Perspective and the WSO2 ESB
 
Integration with SAP using Mule ESB
Integration with SAP using Mule ESBIntegration with SAP using Mule ESB
Integration with SAP using Mule ESB
 
Integrating with SAP FIX and HL7
Integrating with SAP FIX and HL7Integrating with SAP FIX and HL7
Integrating with SAP FIX and HL7
 
WSO2 ESB - The Fastest Open Source ESB with Superior Integration Capabilities
WSO2 ESB - The Fastest Open Source ESB with Superior Integration CapabilitiesWSO2 ESB - The Fastest Open Source ESB with Superior Integration Capabilities
WSO2 ESB - The Fastest Open Source ESB with Superior Integration Capabilities
 
GreenVulcano ESB Technical Overview (ENG)
GreenVulcano ESB Technical Overview (ENG)GreenVulcano ESB Technical Overview (ENG)
GreenVulcano ESB Technical Overview (ENG)
 
Integrate Your Healthcare Information System Using HL7 Transport with WSO2 ESB
Integrate Your Healthcare Information System Using HL7 Transport with WSO2 ESBIntegrate Your Healthcare Information System Using HL7 Transport with WSO2 ESB
Integrate Your Healthcare Information System Using HL7 Transport with WSO2 ESB
 
Hybrid Integration with Dynamics CRM Online, Microsoft Azure Service Bus and ...
Hybrid Integration with Dynamics CRM Online, Microsoft Azure Service Bus and ...Hybrid Integration with Dynamics CRM Online, Microsoft Azure Service Bus and ...
Hybrid Integration with Dynamics CRM Online, Microsoft Azure Service Bus and ...
 
WSO2 Intro Webinar - Simplifying Enterprise Integration with Configurable WS...
WSO2 Intro Webinar -  Simplifying Enterprise Integration with Configurable WS...WSO2 Intro Webinar -  Simplifying Enterprise Integration with Configurable WS...
WSO2 Intro Webinar - Simplifying Enterprise Integration with Configurable WS...
 
Enterprise Integration made easy with WSO2 ESB
Enterprise Integration made easy with WSO2 ESBEnterprise Integration made easy with WSO2 ESB
Enterprise Integration made easy with WSO2 ESB
 
WSO2Con2011: Using WSO2 ESB with SAP ERP (Retail)
WSO2Con2011: Using WSO2 ESB with SAP ERP (Retail)WSO2Con2011: Using WSO2 ESB with SAP ERP (Retail)
WSO2Con2011: Using WSO2 ESB with SAP ERP (Retail)
 
ESB Usage Scenarios and Patterns
ESB Usage Scenarios and PatternsESB Usage Scenarios and Patterns
ESB Usage Scenarios and Patterns
 
Enterprise Service Bus and JBI
Enterprise Service Bus and JBIEnterprise Service Bus and JBI
Enterprise Service Bus and JBI
 
A Buyers Guide to an Enterprise Service Bus (ESB)
A Buyers Guide to an Enterprise Service Bus (ESB)A Buyers Guide to an Enterprise Service Bus (ESB)
A Buyers Guide to an Enterprise Service Bus (ESB)
 
What is an ESB? OPITZ CONSULTING - Winterberg - Trops
What is an ESB? OPITZ CONSULTING - Winterberg - TropsWhat is an ESB? OPITZ CONSULTING - Winterberg - Trops
What is an ESB? OPITZ CONSULTING - Winterberg - Trops
 
WSO2-ESB - The backbone of Enterprise Integration
WSO2-ESB - The backbone of Enterprise IntegrationWSO2-ESB - The backbone of Enterprise Integration
WSO2-ESB - The backbone of Enterprise Integration
 
Introduction to WSO2 Integration Platform
Introduction to WSO2 Integration PlatformIntroduction to WSO2 Integration Platform
Introduction to WSO2 Integration Platform
 
Service Oriented Architecture (SOA) [2/5] : Enterprise Service Bus
Service Oriented Architecture (SOA) [2/5] : Enterprise Service BusService Oriented Architecture (SOA) [2/5] : Enterprise Service Bus
Service Oriented Architecture (SOA) [2/5] : Enterprise Service Bus
 

Similaire à Polyakov how i will break your enterprise. esb security and more

Open Source Software, Distributed Systems, Database as a Cloud Service
Open Source Software, Distributed Systems, Database as a Cloud ServiceOpen Source Software, Distributed Systems, Database as a Cloud Service
Open Source Software, Distributed Systems, Database as a Cloud ServiceSATOSHI TAGOMORI
 
z Technical Summit Track 3 Session 4 Developing mobilefirst app for z
z Technical Summit Track 3 Session 4 Developing mobilefirst app for zz Technical Summit Track 3 Session 4 Developing mobilefirst app for z
z Technical Summit Track 3 Session 4 Developing mobilefirst app for znick_garrod
 
Lares from LOW to PWNED
Lares from LOW to PWNEDLares from LOW to PWNED
Lares from LOW to PWNEDChris Gates
 
DEF CON 27 - ORANGE TSAI and MEH CHANG - infiltrating corporate intranet like...
DEF CON 27 - ORANGE TSAI and MEH CHANG - infiltrating corporate intranet like...DEF CON 27 - ORANGE TSAI and MEH CHANG - infiltrating corporate intranet like...
DEF CON 27 - ORANGE TSAI and MEH CHANG - infiltrating corporate intranet like...Felipe Prado
 
Introduction to FreeSWITCH
Introduction to FreeSWITCHIntroduction to FreeSWITCH
Introduction to FreeSWITCHChien Cheng Wu
 
Metasploitation part-1 (murtuja)
Metasploitation part-1 (murtuja)Metasploitation part-1 (murtuja)
Metasploitation part-1 (murtuja)ClubHack
 
Gib 2021 - Intro to BizTalk Migrator
Gib 2021 - Intro to BizTalk MigratorGib 2021 - Intro to BizTalk Migrator
Gib 2021 - Intro to BizTalk MigratorDaniel Toomey
 
Basic computers for DIU laptop project students
Basic computers for DIU laptop project studentsBasic computers for DIU laptop project students
Basic computers for DIU laptop project studentsAlauddin Azad
 
SoC Keynote:The State of the Art in Integration Technology
SoC Keynote:The State of the Art in Integration TechnologySoC Keynote:The State of the Art in Integration Technology
SoC Keynote:The State of the Art in Integration TechnologySrinath Perera
 
Security in the cloud Workshop HSTC 2014
Security in the cloud Workshop HSTC 2014Security in the cloud Workshop HSTC 2014
Security in the cloud Workshop HSTC 2014Akash Mahajan
 
Null mumbai-reversing-IoT-firmware
Null mumbai-reversing-IoT-firmwareNull mumbai-reversing-IoT-firmware
Null mumbai-reversing-IoT-firmwareNitesh Malviya
 
Funky serverless features at aws
Funky serverless features at awsFunky serverless features at aws
Funky serverless features at awsDoug Winter
 
From Device to Data Center to Insights: Architectural Considerations for the ...
From Device to Data Center to Insights: Architectural Considerations for the ...From Device to Data Center to Insights: Architectural Considerations for the ...
From Device to Data Center to Insights: Architectural Considerations for the ...P. Taylor Goetz
 
Discovering Vulnerabilities For Fun and Profit
Discovering Vulnerabilities For Fun and ProfitDiscovering Vulnerabilities For Fun and Profit
Discovering Vulnerabilities For Fun and ProfitAbhisek Datta
 
Birmingham-20060705
Birmingham-20060705Birmingham-20060705
Birmingham-20060705Miguel Vidal
 
WSO2Con US 2013 - The Integration Game Changer: WSO2 Integration Cloud
WSO2Con US 2013 - The Integration Game Changer: WSO2 Integration CloudWSO2Con US 2013 - The Integration Game Changer: WSO2 Integration Cloud
WSO2Con US 2013 - The Integration Game Changer: WSO2 Integration CloudWSO2
 
WSO2Con 2013 - The Integration Game Changer: WSO2 Integration Cloud
WSO2Con 2013 - The Integration Game Changer: WSO2 Integration CloudWSO2Con 2013 - The Integration Game Changer: WSO2 Integration Cloud
WSO2Con 2013 - The Integration Game Changer: WSO2 Integration CloudAfkham Azeez
 
Basic of computers
Basic of computers Basic of computers
Basic of computers Harsh Porwal
 
Self-Driving Data Center
Self-Driving Data CenterSelf-Driving Data Center
Self-Driving Data CenterSergey A. Razin
 
Www architecture,cgi, client server security, protection
Www architecture,cgi, client server security, protectionWww architecture,cgi, client server security, protection
Www architecture,cgi, client server security, protectionAustina Francis
 

Similaire à Polyakov how i will break your enterprise. esb security and more (20)

Open Source Software, Distributed Systems, Database as a Cloud Service
Open Source Software, Distributed Systems, Database as a Cloud ServiceOpen Source Software, Distributed Systems, Database as a Cloud Service
Open Source Software, Distributed Systems, Database as a Cloud Service
 
z Technical Summit Track 3 Session 4 Developing mobilefirst app for z
z Technical Summit Track 3 Session 4 Developing mobilefirst app for zz Technical Summit Track 3 Session 4 Developing mobilefirst app for z
z Technical Summit Track 3 Session 4 Developing mobilefirst app for z
 
Lares from LOW to PWNED
Lares from LOW to PWNEDLares from LOW to PWNED
Lares from LOW to PWNED
 
DEF CON 27 - ORANGE TSAI and MEH CHANG - infiltrating corporate intranet like...
DEF CON 27 - ORANGE TSAI and MEH CHANG - infiltrating corporate intranet like...DEF CON 27 - ORANGE TSAI and MEH CHANG - infiltrating corporate intranet like...
DEF CON 27 - ORANGE TSAI and MEH CHANG - infiltrating corporate intranet like...
 
Introduction to FreeSWITCH
Introduction to FreeSWITCHIntroduction to FreeSWITCH
Introduction to FreeSWITCH
 
Metasploitation part-1 (murtuja)
Metasploitation part-1 (murtuja)Metasploitation part-1 (murtuja)
Metasploitation part-1 (murtuja)
 
Gib 2021 - Intro to BizTalk Migrator
Gib 2021 - Intro to BizTalk MigratorGib 2021 - Intro to BizTalk Migrator
Gib 2021 - Intro to BizTalk Migrator
 
Basic computers for DIU laptop project students
Basic computers for DIU laptop project studentsBasic computers for DIU laptop project students
Basic computers for DIU laptop project students
 
SoC Keynote:The State of the Art in Integration Technology
SoC Keynote:The State of the Art in Integration TechnologySoC Keynote:The State of the Art in Integration Technology
SoC Keynote:The State of the Art in Integration Technology
 
Security in the cloud Workshop HSTC 2014
Security in the cloud Workshop HSTC 2014Security in the cloud Workshop HSTC 2014
Security in the cloud Workshop HSTC 2014
 
Null mumbai-reversing-IoT-firmware
Null mumbai-reversing-IoT-firmwareNull mumbai-reversing-IoT-firmware
Null mumbai-reversing-IoT-firmware
 
Funky serverless features at aws
Funky serverless features at awsFunky serverless features at aws
Funky serverless features at aws
 
From Device to Data Center to Insights: Architectural Considerations for the ...
From Device to Data Center to Insights: Architectural Considerations for the ...From Device to Data Center to Insights: Architectural Considerations for the ...
From Device to Data Center to Insights: Architectural Considerations for the ...
 
Discovering Vulnerabilities For Fun and Profit
Discovering Vulnerabilities For Fun and ProfitDiscovering Vulnerabilities For Fun and Profit
Discovering Vulnerabilities For Fun and Profit
 
Birmingham-20060705
Birmingham-20060705Birmingham-20060705
Birmingham-20060705
 
WSO2Con US 2013 - The Integration Game Changer: WSO2 Integration Cloud
WSO2Con US 2013 - The Integration Game Changer: WSO2 Integration CloudWSO2Con US 2013 - The Integration Game Changer: WSO2 Integration Cloud
WSO2Con US 2013 - The Integration Game Changer: WSO2 Integration Cloud
 
WSO2Con 2013 - The Integration Game Changer: WSO2 Integration Cloud
WSO2Con 2013 - The Integration Game Changer: WSO2 Integration CloudWSO2Con 2013 - The Integration Game Changer: WSO2 Integration Cloud
WSO2Con 2013 - The Integration Game Changer: WSO2 Integration Cloud
 
Basic of computers
Basic of computers Basic of computers
Basic of computers
 
Self-Driving Data Center
Self-Driving Data CenterSelf-Driving Data Center
Self-Driving Data Center
 
Www architecture,cgi, client server security, protection
Www architecture,cgi, client server security, protectionWww architecture,cgi, client server security, protection
Www architecture,cgi, client server security, protection
 

Plus de DefconRussia

[Defcon Russia #29] Борис Савков - Bare-metal programming на примере Raspber...
[Defcon Russia #29] Борис Савков -  Bare-metal programming на примере Raspber...[Defcon Russia #29] Борис Савков -  Bare-metal programming на примере Raspber...
[Defcon Russia #29] Борис Савков - Bare-metal programming на примере Raspber...DefconRussia
 
[Defcon Russia #29] Александр Ермолов - Safeguarding rootkits: Intel Boot Gua...
[Defcon Russia #29] Александр Ермолов - Safeguarding rootkits: Intel Boot Gua...[Defcon Russia #29] Александр Ермолов - Safeguarding rootkits: Intel Boot Gua...
[Defcon Russia #29] Александр Ермолов - Safeguarding rootkits: Intel Boot Gua...DefconRussia
 
[Defcon Russia #29] Алексей Тюрин - Spring autobinding
[Defcon Russia #29] Алексей Тюрин - Spring autobinding[Defcon Russia #29] Алексей Тюрин - Spring autobinding
[Defcon Russia #29] Алексей Тюрин - Spring autobindingDefconRussia
 
[Defcon Russia #29] Михаил Клементьев - Обнаружение руткитов в GNU/Linux
[Defcon Russia #29] Михаил Клементьев - Обнаружение руткитов в GNU/Linux[Defcon Russia #29] Михаил Клементьев - Обнаружение руткитов в GNU/Linux
[Defcon Russia #29] Михаил Клементьев - Обнаружение руткитов в GNU/LinuxDefconRussia
 
Георгий Зайцев - Reversing golang
Георгий Зайцев - Reversing golangГеоргий Зайцев - Reversing golang
Георгий Зайцев - Reversing golangDefconRussia
 
[DCG 25] Александр Большев - Never Trust Your Inputs or How To Fool an ADC
[DCG 25] Александр Большев - Never Trust Your Inputs or How To Fool an ADC [DCG 25] Александр Большев - Never Trust Your Inputs or How To Fool an ADC
[DCG 25] Александр Большев - Never Trust Your Inputs or How To Fool an ADC DefconRussia
 
Cisco IOS shellcode: All-in-one
Cisco IOS shellcode: All-in-oneCisco IOS shellcode: All-in-one
Cisco IOS shellcode: All-in-oneDefconRussia
 
Олег Купреев - Обзор и демонстрация нюансов и трюков из области беспроводных ...
Олег Купреев - Обзор и демонстрация нюансов и трюков из области беспроводных ...Олег Купреев - Обзор и демонстрация нюансов и трюков из области беспроводных ...
Олег Купреев - Обзор и демонстрация нюансов и трюков из области беспроводных ...DefconRussia
 
HTTP HOST header attacks
HTTP HOST header attacksHTTP HOST header attacks
HTTP HOST header attacksDefconRussia
 
Attacks on tacacs - Алексей Тюрин
Attacks on tacacs - Алексей ТюринAttacks on tacacs - Алексей Тюрин
Attacks on tacacs - Алексей ТюринDefconRussia
 
Weakpass - defcon russia 23
Weakpass - defcon russia 23Weakpass - defcon russia 23
Weakpass - defcon russia 23DefconRussia
 
nosymbols - defcon russia 20
nosymbols - defcon russia 20nosymbols - defcon russia 20
nosymbols - defcon russia 20DefconRussia
 
static - defcon russia 20
static  - defcon russia 20static  - defcon russia 20
static - defcon russia 20DefconRussia
 
Zn task - defcon russia 20
Zn task  - defcon russia 20Zn task  - defcon russia 20
Zn task - defcon russia 20DefconRussia
 
Vm ware fuzzing - defcon russia 20
Vm ware fuzzing  - defcon russia 20Vm ware fuzzing  - defcon russia 20
Vm ware fuzzing - defcon russia 20DefconRussia
 
Nedospasov defcon russia 23
Nedospasov defcon russia 23Nedospasov defcon russia 23
Nedospasov defcon russia 23DefconRussia
 
Advanced cfg bypass on adobe flash player 18 defcon russia 23
Advanced cfg bypass on adobe flash player 18 defcon russia 23Advanced cfg bypass on adobe flash player 18 defcon russia 23
Advanced cfg bypass on adobe flash player 18 defcon russia 23DefconRussia
 
Miasm defcon russia 23
Miasm defcon russia 23Miasm defcon russia 23
Miasm defcon russia 23DefconRussia
 
Andrey Belenko, Alexey Troshichev - Внутреннее устройство и безопасность iClo...
Andrey Belenko, Alexey Troshichev - Внутреннее устройство и безопасность iClo...Andrey Belenko, Alexey Troshichev - Внутреннее устройство и безопасность iClo...
Andrey Belenko, Alexey Troshichev - Внутреннее устройство и безопасность iClo...DefconRussia
 
Sergey Belov - Покажите нам Impact! Доказываем угрозу в сложных условиях
Sergey Belov - Покажите нам Impact! Доказываем угрозу в сложных условияхSergey Belov - Покажите нам Impact! Доказываем угрозу в сложных условиях
Sergey Belov - Покажите нам Impact! Доказываем угрозу в сложных условияхDefconRussia
 

Plus de DefconRussia (20)

[Defcon Russia #29] Борис Савков - Bare-metal programming на примере Raspber...
[Defcon Russia #29] Борис Савков -  Bare-metal programming на примере Raspber...[Defcon Russia #29] Борис Савков -  Bare-metal programming на примере Raspber...
[Defcon Russia #29] Борис Савков - Bare-metal programming на примере Raspber...
 
[Defcon Russia #29] Александр Ермолов - Safeguarding rootkits: Intel Boot Gua...
[Defcon Russia #29] Александр Ермолов - Safeguarding rootkits: Intel Boot Gua...[Defcon Russia #29] Александр Ермолов - Safeguarding rootkits: Intel Boot Gua...
[Defcon Russia #29] Александр Ермолов - Safeguarding rootkits: Intel Boot Gua...
 
[Defcon Russia #29] Алексей Тюрин - Spring autobinding
[Defcon Russia #29] Алексей Тюрин - Spring autobinding[Defcon Russia #29] Алексей Тюрин - Spring autobinding
[Defcon Russia #29] Алексей Тюрин - Spring autobinding
 
[Defcon Russia #29] Михаил Клементьев - Обнаружение руткитов в GNU/Linux
[Defcon Russia #29] Михаил Клементьев - Обнаружение руткитов в GNU/Linux[Defcon Russia #29] Михаил Клементьев - Обнаружение руткитов в GNU/Linux
[Defcon Russia #29] Михаил Клементьев - Обнаружение руткитов в GNU/Linux
 
Георгий Зайцев - Reversing golang
Георгий Зайцев - Reversing golangГеоргий Зайцев - Reversing golang
Георгий Зайцев - Reversing golang
 
[DCG 25] Александр Большев - Never Trust Your Inputs or How To Fool an ADC
[DCG 25] Александр Большев - Never Trust Your Inputs or How To Fool an ADC [DCG 25] Александр Большев - Never Trust Your Inputs or How To Fool an ADC
[DCG 25] Александр Большев - Never Trust Your Inputs or How To Fool an ADC
 
Cisco IOS shellcode: All-in-one
Cisco IOS shellcode: All-in-oneCisco IOS shellcode: All-in-one
Cisco IOS shellcode: All-in-one
 
Олег Купреев - Обзор и демонстрация нюансов и трюков из области беспроводных ...
Олег Купреев - Обзор и демонстрация нюансов и трюков из области беспроводных ...Олег Купреев - Обзор и демонстрация нюансов и трюков из области беспроводных ...
Олег Купреев - Обзор и демонстрация нюансов и трюков из области беспроводных ...
 
HTTP HOST header attacks
HTTP HOST header attacksHTTP HOST header attacks
HTTP HOST header attacks
 
Attacks on tacacs - Алексей Тюрин
Attacks on tacacs - Алексей ТюринAttacks on tacacs - Алексей Тюрин
Attacks on tacacs - Алексей Тюрин
 
Weakpass - defcon russia 23
Weakpass - defcon russia 23Weakpass - defcon russia 23
Weakpass - defcon russia 23
 
nosymbols - defcon russia 20
nosymbols - defcon russia 20nosymbols - defcon russia 20
nosymbols - defcon russia 20
 
static - defcon russia 20
static  - defcon russia 20static  - defcon russia 20
static - defcon russia 20
 
Zn task - defcon russia 20
Zn task  - defcon russia 20Zn task  - defcon russia 20
Zn task - defcon russia 20
 
Vm ware fuzzing - defcon russia 20
Vm ware fuzzing  - defcon russia 20Vm ware fuzzing  - defcon russia 20
Vm ware fuzzing - defcon russia 20
 
Nedospasov defcon russia 23
Nedospasov defcon russia 23Nedospasov defcon russia 23
Nedospasov defcon russia 23
 
Advanced cfg bypass on adobe flash player 18 defcon russia 23
Advanced cfg bypass on adobe flash player 18 defcon russia 23Advanced cfg bypass on adobe flash player 18 defcon russia 23
Advanced cfg bypass on adobe flash player 18 defcon russia 23
 
Miasm defcon russia 23
Miasm defcon russia 23Miasm defcon russia 23
Miasm defcon russia 23
 
Andrey Belenko, Alexey Troshichev - Внутреннее устройство и безопасность iClo...
Andrey Belenko, Alexey Troshichev - Внутреннее устройство и безопасность iClo...Andrey Belenko, Alexey Troshichev - Внутреннее устройство и безопасность iClo...
Andrey Belenko, Alexey Troshichev - Внутреннее устройство и безопасность iClo...
 
Sergey Belov - Покажите нам Impact! Доказываем угрозу в сложных условиях
Sergey Belov - Покажите нам Impact! Доказываем угрозу в сложных условияхSergey Belov - Покажите нам Impact! Доказываем угрозу в сложных условиях
Sergey Belov - Покажите нам Impact! Доказываем угрозу в сложных условиях
 

Polyakov how i will break your enterprise. esb security and more

  • 1. Invest in security to secure investments How I will break your enterprise: ESB Security and more Alexander Polyakov CTO at ERPScan (Digital Security) November 19, 2012
  • 2. Me Business application security expert
  • 3. The question How to break a secure enterprise network?
  • 4. Hint What do we do if we have a secure target website on a hosting?
  • 5. Answer • We can do the same for companies • Just Google for the target company suppliers and customers • Pwn one of them • Find a link to the secured company
  • 6. But how? • Almost all big companies are connected to each other • To make their business work • For example, companies generate automatic Payment Orders from one business application to another • They use some kind of middleware to do this • Sometimes, those systems can be open to the Internet • Mostly not • But they must be open for partners • What kind of systems are u talking about?
  • 8. ESB
  • 10. What do we know about their security? • Nothing – Actually, very little info • They can have vulnerabilities – A lot of vulnerabilities • Because they are complex – Very complex • And very customized – Because it’s more of a framework than software
  • 11. Some ESB problems ESB is all about DATA • Missing encryption – Not so easy to configure, so mostly unencrypted – A lot of swag data transferring • Support for a lot of interfaces and protocols – Many points of failure – Can be used as a proxy to attack other systems And, of course, all the other software security problems
  • 12. If we attack ESB from a connected company • We have one bonus • As we have already pwn’d the connected company • We have auth data to connect to ESB interfaces • But our goal is to jump through ESB to the target company
  • 13. IBM Web Sphere MQ • IBM Web Sphere MQ • Middleware application for handling messaging within an enterprise network • The first ESB that was publicly researched for vulnerabilities (in 2007) • A great presentations by MWRLab • Whitepaper with 87 pages of MQ insights! • http://labs.mwrinfosecurity.com/assets/141/mwri_websphere -mq-security-white-paper-part1_2008-05-06.pdf
  • 14. SAP NetWeaver PI • SAP NetWeaver PI / XI • Tool for process integration / system integration • Has SOAP Adapter • With default services • We found one that was accessible without authorizations • Accept XML: any XML based attack (Patched by SAP Note 1707494) DilbertMSG • /XISOAPAdapter/servlet/com.sap.aii.af.mp.soap.web. • More about this later
  • 16. Microsoft BizTalk • MS BizTalk • For the same purpose • ESB toolkit used to be additional software, but in BizTalk 2013, it is integrated • 0 results for “BizTalk Security” in search engines • Doesn’t have default services with auth bypass :(
  • 17. If somebody really used it?
  • 18. BizTalk map Company External Web-portal Suppliers HR Customers Data Warehouse BizTalk Banks Logistics Insurance BizTalk ERP Partners Billing Branches Picture taken from http://habrahabr.ru/post/94861/
  • 19. Microsoft BizTalk: how it works • You send data to a virtual “Input port” • The port can be anything, from a file to an FTP folder or a web service or something else • BizTalk takes this data and transforms it (Orchestration) • There are special tools to perform the transformation • Then the packet is sent to an “Output port” So, the simple transformation can have common XML issues depending on the application
  • 20. Microsoft BizTalk Different ways to transfer data –Simple transfer (Static binding) –Bindings (Dynamic binding) –Itinerary
  • 22. BizTalk Transformation example • The operation is performed by a functoid • There are a lot of functoids with math and logical stuff • One of the funniest to attack is Database lookup functoid • If u find it in some XML, u can connect to external DB’s • Sometimes with integrated security (trust) Provider=msdaora;Data Source=thisdb;Persist Security Info=False;Integrated Security=Yes; • Also supported: Sybase, Oracle, MySQL, Informix, FoxPro, Firebird, Exchange, Excel, DBase, DB2,Access …
  • 23. BizTalk Binding Virtual ports must be linked to the real ports they call (binding) • Static binding. A static port is already configured at the time of deployment to use a transport so as to deliver messages to a specific external end point. A transport type selects an adapter and a URI address. • Direct binding can also be used to send messages directly into the message box. External binding configuration cannot be used with directly bound orchestration ports. • Dynamic Binding. Transport types and locations dynamically selected by dynamic ports. The orchestration port is responsible for having the required properties created within the message context.
  • 24. A packet with dynamic binding (any ideas?)
  • 26. BizTalk Binding: use your imagination • XPATH • STATIC • Business Rules Engine (BRE) • BRI • UDDI • UDDI3 • LDAP • MQS • FTP • FILE • . • . • .
  • 27. BizTalk Itinerary: full control over the packet • Itinerary-based routing simplifies the development of enterprise-level messaging • In simple words, an itinerary is a sequence of operations performed on a message • An itinerary consists of the list of services to execute (which can contain routing, transformation, and custom services) and the configuration information required to resolve the metadata necessary to execute each of these services • For example, it may instruct the service to perform UDDI or Business Rules Engine (BRE) lookup for information about a specific target end point to which it will route the message A huge area to have fun
  • 28. Searching for BizTalk applications • OK, cool, but how can we find all this stuff? • Except sniffing? • Answer: UDDI • Database of all web services installed on BizTalk • Just look for ports 80 or 8080 for /uddi or /uddipublic • Add WSDL to URL :)
  • 30. And one more thing: don’t forget about web.config
  • 31. So, u are inside the company’s network Now what?
  • 32. Secure corporate network Corporate ERP Industrial The network network network Internet
  • 33. But wait. There must be some links!
  • 34. Real corporate network The Corporate ERP Industrial Internet network network network
  • 36. Corporate network attack scenario The Corporate ERP Industrial Internet network network network
  • 38.
  • 39. Supa Sexy Robo Fashion
  • 40. SSRF proxy attack Corporate Secure network network Packet B Packet B Packet A
  • 41. SSRF • A possibility to use a vulnerable server as a proxy to attack other servers located in secure subnetwork • A way to jump from one subnetwork to another • A lot of examples of how to run SSRF attack • We can use any popular business application to run SSRF • More details about SSRF – Part 1 http://erpscan.com/wp-content/uploads/2012/08/SSRF-vs-Businness-critical- applications-whitepaper.pdf – Part 2 http://erpscan.com/wp-content/uploads/2012/11/SSRF.2.0.poc_.pdf
  • 42. Exploiting SSRF For every SSRF attack, there must be at least 2 vulnerabilities to successfully trigger the attack: • First vulnerability – Functionality in some service on Server A which allows us to send remote packets (for other types of SSRF) • Second vulnerability – Vuln. in service on server B (for remote SSRF ) – Vuln. in localhost service on server A (for local SSRF) – Vuln. in client app. on server A (for back-connect SSRF)
  • 43. Multiprotocol calls (in XML) • A lot of XML stuff in ESB • XML seems to be the new TCP • Almost all big projects use XML based data transfer • There are a lot of XML based protocols with different options to call external resources and thus conduct SSRF attacks • There is at least one element type which fits almost all XML based schemes. The type is: xsd:anyURI • URIs also encompass URLs of other schemes (e.g., FTP, gopher, telnet), as well as URNs • Popular URIs: http:// ftp:// telnet:// …..
  • 44. Multiprotocol calls in XML • XML – XML External Entity – XSD definition • XML Encryption • XML Signature • WS-Policy • From WS-Security • WS-Addressing • XBRL • ODATA (edmx) – ODATA External Entity – Other • BPEL • STRATML • ……. Details: http://erpscan.com/wp-content/uploads/2012/11/SSRF.2.0.poc_.pdf
  • 45. Exploiting Gopher (Example) <?xml version="1.0" encoding="ISO-8859-1"?> <!DOCTYPE foo [ <!ELEMENT foo ANY > <!ENTITY date SYSTEM “gopher://172.16.0.1:3300/AAAAAAAAA" >]> <foo>&date;</foo> What will happen??
  • 46. XXE Tunneling (Example) Server A (Portal or XI) POST /XISOAPAdapter/servlet/com.sap.aii.af.mp.soap. web.DilbertMSG?format=post HTTP/1.1 Host: 192.168.0.1:8000 192.168.0.1 <?xml version="1.0" encoding="ISO-8859-1"?> <!DOCTYPE foo [ <!ELEMENT foo ANY > <!ENTITY date SYSTEM AAAAAAAAAAAAA Server B (ERP, “gopher://172.16.0.1:3300/AAAAAAAAA" >]> <foo>&date;</foo> HR, BW etc.) Port 3300 telnet 172.16.0.1 3300 172.16.0.1
  • 47. XXE Tunneling (Hint 2) • Next step is to pack exploit in packet B inside Packet A • We need to insert non-printable symbols • God bless gopher; it supports urlencode like HTTP • It will also help us evade attack against IDS systems Packet A POST /XISOAPAdapter/servlet/com.sap.aii.af.mp.soap.web.DilbertMSG?format=post HTTP/1.1 Host: sapserver.com:80 Content-Length: 7730 <?xml version="1.0" encoding="ISO-8859-1"?> <!DOCTYPE foo [ <!ELEMENT foo ANY > <!ENTITY date SYSTEM “gopher://[Urlencoded Packet B]" >]> <foo>&date;</foo>
  • 48. XXE Tunneling to Buffer Overflow (Result) Server A on the Internet (SAP XI) POST /XISOAPAdapter/servlet/com.sap.aii.af.mp.soap. web.DilbertMSG?format=post HTTP/1.1 Host: sapserver.com:80 Packet B <?xml version="1.0" encoding="ISO-8859-1"?> <!DOCTYPE foo [ <!ELEMENT foo ANY > <!ENTITY date SYSTEM “gopher://[packetB]" >]> http://company.com Server B in DMZ <foo>&date;</foo> exploit Packet C – Command and Control response to attacker by Shellcode DNS protocol, which is allowed service with for outband connections DNS payload 172.16.0.1
  • 49. Great, we can jump from one secured network to another. What’s next?
  • 50. We are inside, so what? • All your systems have password lock policies • Because we are in a secure company, rrright? • And secure applications send passwords securely • While user is authenticating
  • 51. We are inside, so what? • All your systems have password lock policies • Because we are in a secure company, rrright? • And secure applications send passwords securely • While user is authenticating!
  • 52. OK, but what about creating a new user?
  • 54. The same applies to when a user is changing their password due to security policies
  • 56. More than real. 5000 users change pass every 90 days => Every hour, 2 users change their passwords
  • 57. If we don’t want to wait, we can brute until the account is locked, then the administrator will unlock it and 99% change the pass
  • 58. Why MsSQL? • Just because I sometimes want to speak about something other than SAP and Oracle, so let it be MS • It’s everybody’s problem
  • 59. They have the same problems • MySQL • Oracle console • Oracle Enterprise Manager • MsSQL Console • MsSQL Enterprise Manager • etc…
  • 60. I don’t want user interaction • We need some kind of user interaction • But that’s not so tasty • Let’s look at something else
  • 62. Issue tracking systems • Noh I’m not talking about XSS/SQLI/LFI/OMG/WTF/ETC • Of course they exist, but • We are in a “very-very secure” company, which has WAF • And HTTPS • Really secure HTTPS (yes Moxie)
  • 65. Sniff mail requests Mail requests are unencrypted
  • 66. Access to the kingdom
  • 67. So Because they usually have a wiki where all the neat stuff is stored, like keys to other systems
  • 68. Questions? web: www.dsec.ru www.erpscan.com e-mail: a.polyakov@dsec.ru Twitter: @sh2kerr Big thanks to Nikolay Mescherin :)