SAP Netweaver
Introduction
SAP system consists of a number of fully integrated modules, which covers virtually every aspect of business management.
The product is marketed as a service-oriented architecture for enterprise application integration.
It can be used for custom development and integration with other applications and systems, and is built primarily using the ABAP programming language, but also uses C, C++, and Java.
It can also be extended with, and interoperate with, technologies such as Microsoft .NET, Java EE, and IBM WebSphere.
Discovery
You can use Shodan and Google Dorks to check for files, subdomains, and juicy information if the application is Internet-facing or public:
You can also use gobuster
, ffuf
and BurpSuiteIntuder
to scan for files and directory using the following wordlists:
A typical SAP logon screen (http://SAP:50000/irj/portal) looks like the following:
Potential information goldmine paths
Try
/irj/go/km/navigation/
for possibledirectory listing
orauthentication bypass
http://SAP/sap/public/info contains some juicy information
Default Credentials
Each SAP instance is divided into clients. Each one has a user SAP*, the applicationβs equivalent of βrootβ. Upon initial creation, this user SAP* gets a default password: β060719992β
Known RCE Exploit
Try to use some known exploits (check out Exploit-DB) or attacks like the SAP ConfigServlet Remote Code Execution:
Last updated