{"id":4097,"date":"2016-11-25T00:13:14","date_gmt":"2016-11-24T23:13:14","guid":{"rendered":"http:\/\/e3mag.com\/?p=4097"},"modified":"2022-02-06T00:10:35","modified_gmt":"2022-02-05T23:10:35","slug":"ethical-hacking-in-sap","status":"publish","type":"post","link":"https:\/\/e3mag.com\/en\/ethical-hacking-in-sap\/","title":{"rendered":"Ethical Hacking in SAP"},"content":{"rendered":"<p>The temporary inaccessibility of websites of popular online services such as <span id=\"urn:local-text-annotation-ebhe0903j5ojwpi51h50xpegowil8p1h\" class=\"textannotation disambiguated wl-organization\">Twitter<\/span>, <span id=\"urn:local-text-annotation-mj0x2w877wa4w8ukxvxf70rztcids8t8\" class=\"textannotation disambiguated wl-organization\">Spotify<\/span>, <span id=\"urn:local-text-annotation-9wgqj1adm9p64f1ziie5f8fw9hyrfzsp\" class=\"textannotation disambiguated wl-organization\">Reddit<\/span> or <span id=\"urn:local-text-annotation-6af309o7ibkudbf5gnttxbe0xcelnn30\" class=\"textannotation disambiguated wl-organization\">Paypal<\/span> in October, the recently disclosed theft of 500 million customer records at <span id=\"urn:local-text-annotation-55ahhaxjf22g4wodzb7wxl3ul6bz7wrz\" class=\"textannotation disambiguated wl-organization\">Yahoo<\/span> 2014, the repeated cyber attacks on websites of the Federal Chancellery and the Bundestag - news about incidents that point to the vulnerability of our thoroughly digitized world is felt to be in surplus.<\/p>\n<p>More than ever, therefore, companies are required by self-interest, but also by the legislature, to <span id=\"urn:local-text-annotation-2yn17ztrde2zsvpmhyuzym79at5yvc3c\" class=\"textannotation disambiguated wl-thing\">IT<\/span>-, communication and control technology-<span id=\"urn:local-text-annotation-67ggkvqrrwv1r8k5zr3tbi5e7wmb6ora\" class=\"textannotation disambiguated wl-thing\">Infrastructures<\/span> of their organization.<\/p><div id=\"great-1071072939\" class=\"great-fullsize-content-en\" style=\"margin-bottom: 20px;\"><a data-no-instant=\"1\" href=\"https:\/\/www.youtube.com\/watch?v=6yfv7eho3Gc\" rel=\"noopener\" class=\"a2t-link\" target=\"_blank\" aria-label=\"Fullsize\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26_04_08_1200x150.jpg\" alt=\"Fullsize\"  srcset=\"https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26_04_08_1200x150.jpg 1200w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26_04_08_1200x150-400x50.jpg 400w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26_04_08_1200x150-768x96.jpg 768w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26_04_08_1200x150-100x13.jpg 100w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26_04_08_1200x150-480x60.jpg 480w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26_04_08_1200x150-640x80.jpg 640w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26_04_08_1200x150-720x90.jpg 720w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26_04_08_1200x150-960x120.jpg 960w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26_04_08_1200x150-1168x146.jpg 1168w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26_04_08_1200x150-18x2.jpg 18w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26_04_08_1200x150-600x75.jpg 600w\" sizes=\"(max-width: 1200px) 100vw, 1200px\" width=\"1200\" height=\"150\"  style=\" max-width: 100%; height: auto;\" \/><\/a><\/div>\n<p>Two years ago, a self-test carried out by the Ettlingen-based <span id=\"urn:local-text-annotation-9cjm12tcjsyrzr9uj4qmq6ikdxxijwjv\" class=\"textannotation disambiguated wl-thing\">Public utilities<\/span>.<\/p>\n<p>Within two days, a contractor succeeded in <span id=\"urn:local-text-annotation-7k05dwff62d8wy2yhngacel6v5wska91\" class=\"textannotation disambiguated wl-thing\">IT<\/span>-experts to join the network of <span id=\"urn:local-text-annotation-ff5rrb15isco7a4554mptsaxhpmfj4b5\" class=\"textannotation disambiguated wl-thing\">Public utilities<\/span> to \"hack\" and take control of the control room.<\/p>\n<p>\"Ethical hacking\", as the expert's working method in Ettlingen is also known, is regarded as a proven means of obtaining a situational picture of the effectiveness of one's own technical and organizational measures in terms of security.<\/p>\n<p>For example, in security checks from BTC, subject matter experts who are certified as \"Ethical <span id=\"urn:local-text-annotation-xqd5eosa1o9ej74iw1qwqb1lfcykuql9\" class=\"textannotation disambiguated wl-thing\">Hacker<\/span>\" are certified, the hazard potential of <span id=\"urn:local-text-annotation-wd967n6dehs012og4jetbv7gvhgnel3m\" class=\"textannotation disambiguated wl-thing\">IT<\/span>-evaluate environments.<\/p>\n<p>For this purpose, the procedure and the <span id=\"urn:local-text-annotation-5gal7sssr16ujm79zfatbzqjq6n8fdfc\" class=\"textannotation disambiguated wl-thing\">Technology<\/span> criminal <span id=\"urn:local-text-annotation-8h0yt027e4mukjzovx1qqjxnqbbjp7u1\" class=\"textannotation disambiguated wl-thing\">Hacker<\/span> simulated to detect security vulnerabilities in critical areas before they are actually exploited by malicious attacks.<\/p>\n<h2>SAP: Complexity creates attack surfaces<\/h2>\n<p>The evaluation of the results of the security checks carried out by BTC in the companies shows that it is often small technical and organizational weaknesses that cause the <span id=\"urn:local-text-annotation-z8nid2yxwgsjt7yawzihjw805gwgrzcs\" class=\"textannotation disambiguated wl-thing\">Hackers<\/span> make life - or more precisely, work - easier.<\/p>\n<p>Frequently encountered shortcomings include, for example, the fact that roles and responsibilities for processes and systems are not clearly defined from a security perspective and that no central responsibility is institutionalized.<\/p>\n<p>In SAP environments, for example, mission-critical production systems often share a common network segment with less critical office applications.<a href=\"https:\/\/e3mag.com\/wp-content\/uploads\/2016\/12\/Christian-Bruns-BTC-Technology.jpg\"><img loading=\"lazy\" decoding=\"async\" title=\"Ethical hacking in sap\" class=\"wp-image-4120 size-full alignleft\" src=\"https:\/\/e3mag.com\/wp-content\/uploads\/2016\/12\/Christian-Bruns-BTC-Technology-e1481890624980.jpg\" alt=\"Christian-Bruns-BTC-Technology\" width=\"237\" height=\"387\" srcset=\"https:\/\/e3mag.com\/wp-content\/uploads\/2016\/12\/Christian-Bruns-BTC-Technology-e1481890624980.jpg 237w, https:\/\/e3mag.com\/wp-content\/uploads\/2016\/12\/Christian-Bruns-BTC-Technology-e1481890624980-100x163.jpg 100w\" sizes=\"auto, (max-width: 237px) 100vw, 237px\" \/><\/a><\/p>\n<p>An ongoing topic are <span id=\"urn:local-text-annotation-99ef69dp2tjkjc8oxx4sbev9yineahxm\" class=\"textannotation disambiguated wl-thing\">Passwords<\/span>. Penetration tests show that especially for SAP systems in connection with development tasks or quality assurance, too simple <span id=\"urn:local-text-annotation-y7ktbq6jby4ihj68leznrgoemrs9g3gr\" class=\"textannotation disambiguated wl-thing\">Passwords<\/span> and\/or accounts are only used with preset access data (credentials).<\/p>\n<p>The authorizations and group IDs that are assigned once and that are not deleted or changed when jobs or tasks are changed also pose a recurring risk.<\/p>\n<p>This can lead to the (not so) amusing consequence that apprentices or trainees who pass through different departments have the most <span id=\"urn:local-text-annotation-56ybm0qmmwxre17s4eiltdh8fwi2lojd\" class=\"textannotation disambiguated wl-thing\">Access rights<\/span> own<\/p>\n<p>The growing complexity, especially in SAP<span id=\"urn:local-text-annotation-eu45r5l5c97uybwdzv30qdk4f8dr2tnz\" class=\"textannotation disambiguated wl-thing\">Infrastructures<\/span>The vulnerability due to negligent configurations is additionally increased, for example, by not applying patches or updates for <span id=\"urn:local-text-annotation-ege36wubiub0t6i9ypaic6l136wq7sur\" class=\"textannotation disambiguated wl-thing\">Operating systems<\/span>, <span id=\"urn:local-text-annotation-5bvpswppsk7coznxiney6mtug5xif8um\" class=\"textannotation disambiguated wl-thing\">Web<\/span>-<span id=\"urn:local-text-annotation-by308r23gphn4ota30pvvd78nxhqry20\" class=\"textannotation disambiguated wl-thing\">Server<\/span>, databases and\/or also SAP-<span id=\"urn:local-text-annotation-50thw7kd9v6cxkjsdr3v5u56tmnmiv4h\" class=\"textannotation disambiguated wl-thing\">Software<\/span>.<\/p>\n<p>What toughness even known <span id=\"urn:local-text-annotation-j5mutun2uverzlydhh1kps3bx0gzma78\" class=\"textannotation disambiguated wl-thing\">Error<\/span> develop at this point, shows the Invoker Serlet. A security vulnerability of the component from the Java-<span id=\"urn:local-text-annotation-wa6iifkhc2qkwjo0muw9gr1r7yavinev\" class=\"textannotation disambiguated wl-thing\">Server<\/span> in SAP NetWeaver prompted in May of this year the <span id=\"urn:local-text-annotation-wpy749j4zp97iscm2kdpmdxil072zojh\" class=\"textannotation disambiguated wl-thing\">US-CERT<\/span>-(United States Computer Emergency Readiness Team), for the first time issued an official warning regarding SAP-<span id=\"urn:local-text-annotation-m45wfnmd296okgxcpv708waiw9gz7slm\" class=\"textannotation disambiguated wl-thing\">Software<\/span> to pronounce.<\/p>\n<p>Mind you, this is a problem that has been known for six years, and at the time - although a patch has been available for a long time - it is still in the <span id=\"urn:local-text-annotation-k2fz2nhvzdrrezguan37ijfilm0fotbf\" class=\"textannotation disambiguated wl-thing\">Infrastructures<\/span> of at least 36 organizations worldwide was still to be found.<\/p>\n<p>Poor configurations, inadequately protected network structures or overly simplistic account management make hacking easier.<\/p>\n<p>At the Ettlingen municipal utility, for example, it was an open network port in the guest house that the Ethical <span id=\"urn:local-text-annotation-492iti4ueih78sr038fozxrzbkodjorp\" class=\"textannotation disambiguated wl-thing\">Hacker<\/span> used.<\/p>\n<p>Combined with a little social engineering and analysis of communication patterns on the network, it was enough to eventually open the gateway to the control room.<\/p>\n<p>To prevent this from happening in the first place, every company is well advised to carry out manual and automated analyses and tests at regular intervals with the support of Ethical <span id=\"urn:local-text-annotation-ob08v1u1breasi7xng1uvyb94nfzt265\" class=\"textannotation disambiguated wl-thing\">Hackers<\/span> to perform.<\/p>\n<p>In this way, potential weaknesses in the structure and configuration of the SAP landscape can be identified in all architecture areas and precautions can be taken with suitable technical or organizational means.<\/p>\n<p><a href=\"https:\/\/e3mag.com\/en\/partners\/btc-business-technology-consulting-ag\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img loading=\"lazy\" decoding=\"async\" title=\"Ethical hacking in sap\" class=\"aligncenter wp-image-11358 size-full\" src=\"https:\/\/e3mag.com\/wp-content\/uploads\/2017\/03\/CI-BTC.jpg\" alt=\"https:\/\/e3mag.com\/partners\/btc-business-technology-consulting-ag\/\" width=\"1000\" height=\"112\" srcset=\"https:\/\/e3mag.com\/wp-content\/uploads\/2017\/03\/CI-BTC.jpg 1000w, https:\/\/e3mag.com\/wp-content\/uploads\/2017\/03\/CI-BTC-768x86.jpg 768w, https:\/\/e3mag.com\/wp-content\/uploads\/2017\/03\/CI-BTC-100x11.jpg 100w, https:\/\/e3mag.com\/wp-content\/uploads\/2017\/03\/CI-BTC-480x54.jpg 480w, https:\/\/e3mag.com\/wp-content\/uploads\/2017\/03\/CI-BTC-640x72.jpg 640w, https:\/\/e3mag.com\/wp-content\/uploads\/2017\/03\/CI-BTC-720x81.jpg 720w, https:\/\/e3mag.com\/wp-content\/uploads\/2017\/03\/CI-BTC-960x108.jpg 960w\" sizes=\"auto, (max-width: 1000px) 100vw, 1000px\" \/><\/a><\/p>","protected":false},"excerpt":{"rendered":"<p>Digitalization makes critical infrastructures vulnerable. One way to check the level of security is through security analyses by so-called \"ethical hackers\". With professional help, security gaps are identified in good time before \"real\" hackers cause real damage. <\/p>","protected":false},"author":78,"featured_media":4119,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"pmpro_default_level":"","footnotes":""},"categories":[4,740],"tags":[637,111,117,400],"coauthors":[23729],"class_list":["post-4097","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-management","category-mag1612","tag-hacker","tag-infrastruktur","tag-sicherheit","tag-software","pmpro-has-access"],"acf":[],"featured_image_urls_v2":{"full":["https:\/\/e3mag.com\/wp-content\/uploads\/2016\/12\/Hacker.jpg",1000,667,false],"thumbnail":["https:\/\/e3mag.com\/wp-content\/uploads\/2016\/12\/Hacker-150x150.jpg",150,150,true],"medium":["https:\/\/e3mag.com\/wp-content\/uploads\/2016\/12\/Hacker.jpg",400,267,false],"medium_large":["https:\/\/e3mag.com\/wp-content\/uploads\/2016\/12\/Hacker-768x512.jpg",768,512,true],"large":["https:\/\/e3mag.com\/wp-content\/uploads\/2016\/12\/Hacker.jpg",1000,667,false],"image-100":["https:\/\/e3mag.com\/wp-content\/uploads\/2016\/12\/Hacker-100x67.jpg",100,67,true],"image-480":["https:\/\/e3mag.com\/wp-content\/uploads\/2016\/12\/Hacker-480x320.jpg",480,320,true],"image-640":["https:\/\/e3mag.com\/wp-content\/uploads\/2016\/12\/Hacker-640x427.jpg",640,427,true],"image-720":["https:\/\/e3mag.com\/wp-content\/uploads\/2016\/12\/Hacker-720x480.jpg",720,480,true],"image-960":["https:\/\/e3mag.com\/wp-content\/uploads\/2016\/12\/Hacker-960x640.jpg",960,640,true],"image-1168":["https:\/\/e3mag.com\/wp-content\/uploads\/2016\/12\/Hacker.jpg",1000,667,false],"image-1440":["https:\/\/e3mag.com\/wp-content\/uploads\/2016\/12\/Hacker.jpg",1000,667,false],"image-1920":["https:\/\/e3mag.com\/wp-content\/uploads\/2016\/12\/Hacker.jpg",1000,667,false],"1536x1536":["https:\/\/e3mag.com\/wp-content\/uploads\/2016\/12\/Hacker.jpg",1000,667,false],"2048x2048":["https:\/\/e3mag.com\/wp-content\/uploads\/2016\/12\/Hacker.jpg",1000,667,false],"trp-custom-language-flag":["https:\/\/e3mag.com\/wp-content\/uploads\/2016\/12\/Hacker.jpg",18,12,false],"bricks_large_16x9":["https:\/\/e3mag.com\/wp-content\/uploads\/2016\/12\/Hacker.jpg",1000,667,false],"bricks_large":["https:\/\/e3mag.com\/wp-content\/uploads\/2016\/12\/Hacker.jpg",1000,667,false],"bricks_large_square":["https:\/\/e3mag.com\/wp-content\/uploads\/2016\/12\/Hacker.jpg",1000,667,false],"bricks_medium":["https:\/\/e3mag.com\/wp-content\/uploads\/2016\/12\/Hacker.jpg",600,400,false],"bricks_medium_square":["https:\/\/e3mag.com\/wp-content\/uploads\/2016\/12\/Hacker.jpg",600,400,false],"profile_24":["https:\/\/e3mag.com\/wp-content\/uploads\/2016\/12\/Hacker-24x24.jpg",24,24,true],"profile_48":["https:\/\/e3mag.com\/wp-content\/uploads\/2016\/12\/Hacker-48x48.jpg",48,48,true],"profile_96":["https:\/\/e3mag.com\/wp-content\/uploads\/2016\/12\/Hacker-96x96.jpg",96,96,true],"profile_150":["https:\/\/e3mag.com\/wp-content\/uploads\/2016\/12\/Hacker-150x150.jpg",150,150,true],"profile_300":["https:\/\/e3mag.com\/wp-content\/uploads\/2016\/12\/Hacker-300x300.jpg",300,300,true]},"post_excerpt_stackable_v2":"<p>Die Digitalisierung macht kritische Infrastrukturen verwundbar. Ein Mittel, das Sicherheitsniveau zu pr\u00fcfen, sind Sicherheitsanalysen durch sogenannte \u201eEthical Hacker\u201c. Mit professioneller Hilfe werden Sicherheitsl\u00fccken rechtzeitig identifiziert, bevor \u201ereale\u201c Hacker echten Schaden anrichten. <\/p>\n","category_list_v2":"<a href=\"https:\/\/e3mag.com\/en\/category\/management\/\" rel=\"category tag\">Business-Management<\/a>, <a href=\"https:\/\/e3mag.com\/en\/category\/likes1612\/\" rel=\"category tag\">MAG 16-12<\/a>","author_info_v2":{"name":"Christian Bruns, BTC","url":"https:\/\/e3mag.com\/en\/author\/christian-bruns\/"},"comments_num_v2":"0 comments","_links":{"self":[{"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/posts\/4097","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/users\/78"}],"replies":[{"embeddable":true,"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/comments?post=4097"}],"version-history":[{"count":0,"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/posts\/4097\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/media\/4119"}],"wp:attachment":[{"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/media?parent=4097"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/categories?post=4097"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/tags?post=4097"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/coauthors?post=4097"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}