SlideShare una empresa de Scribd logo
1 de 77
Descargar para leer sin conexión
Hackproofing Oracle Financials

Vulnerabilities in Oracle E-Business Suite R12




               Vulnerabilities in Oracle Financials - Joxean
                                   Koret
What is Oracle Financials?

Is an Enterprise Resource Planing product
(ERP)
The names Oracle E-Business Suite, Oracle
Applications, Oracle Financials, etc... does refer
to the same product




              Vulnerabilities in Oracle Financials - Joxean
                                  Koret
ERP Statistics

As of 2005, SAP and Oracle Applications were
the most deployed




             Vulnerabilities in Oracle Financials - Joxean
                                 Koret
Market Share




Vulnerabilities in Oracle Financials - Joxean
                    Koret
Market Share




Vulnerabilities in Oracle Financials - Joxean
                    Koret
Market Share




Vulnerabilities in Oracle Financials - Joxean
                    Koret
Market Share




Vulnerabilities in Oracle Financials - Joxean
                    Koret
Who is using Oracle Financials?

Very large list of customers
  http://www.oracle.com/customers/products/financials2.html
In short...
  Militars & Governments, i.e.: North Atlantic Treaty
  Organization (NATO)
  Banks
  Airways & Airlines
  Petrochemical companies
  Hospitals
  ...
                  Vulnerabilities in Oracle Financials - Joxean
                                      Koret
Some well known customers

Marvel, Banque de France, U.S. Airways, U.S.
Navy, U.S. Army, Mitsubishi, Airtel, NH Hotels,
Canon, EMC Corporation, Flemish
Government, Fujitsu, Toshiba, Google Inc,
Unisys, U.S. Postal Service, Toyota, General
Electrics, Dubai's Government, Oracle itself,
etc...
Enough (and interesting) customers to care
about ;)

              Vulnerabilities in Oracle Financials - Joxean
                                  Koret
About the talk

What are we going to covert in this talk?
  Architecture overview (Basic Concepts + Brief
  introduction)
  Components (11i & R12)
  Design flaws
  Vulnerabilities
  How to own



                 Vulnerabilities in Oracle Financials - Joxean
                                     Koret
Architecture Overview




     Vulnerabilities in Oracle Financials - Joxean
                         Koret
Architecture: Attacker's point of view

Applications Server's components
  Web Server, Forms Server (& Reports Server)
    But Reports is not always available from internet
  JSP, Servlets, CGIs and ”the” PL/SQL Gateway
    PL/SQL Gateway removed in R12 due to many security
    problems
Database Server's components
  Data
  PL/SQL software
                Vulnerabilities in Oracle Financials - Joxean
                                    Koret
Basic Concepts

Forms Server
  Java Applet that communicates (via HTTP in the
  latest versions) with the application server
  Used to show GUIs
Reports Server
  The same but only for reports
PL/SQL Gateway
  A way to execute PL/SQL code directly from a
  browser, like a CGI but inside the database
               Vulnerabilities in Oracle Financials - Joxean
                                   Koret
Information Gathering




   Vulnerabilities in Oracle Financials - Joxean
                       Koret
Information Gathering

Oracle Financials 11i
  http://middletier/pls/DAD/fnd_web.ping
Oracle Financials R12
  PL/SQL Gateway removed, URL changed to:
  http://middletier/OA_HTML/jsp/fnd/fndping.jsp
What information we get this way?



               Vulnerabilities in Oracle Financials - Joxean
                                   Koret
Information Gathered




    Vulnerabilities in Oracle Financials - Joxean
                        Koret
Information Gathering




   Install Path Disclosure




     Vulnerabilities in Oracle Financials - Joxean
                         Koret
Install Path Disclosure

The script /OA_HTML/biserror.jsp receives a
parameter called ”DBC” (DataBase
Configuration)
  Is a file in the middle-tier with information regarding
  the database address, etc...
  It reveals the installation path when a non-existent
  DBC file is given to script




                Vulnerabilities in Oracle Financials - Joxean
                                    Koret
Installation Path Disclosure




        Vulnerabilities in Oracle Financials - Joxean
                            Koret
Information Gathering

The information retrieval (sometimes) is vital for succesful
intrusions
   Databases's SID and schema (commonly APPS)
   It's also typical to host multiple Oracle Financials
   instances in the same machine:
      /d01/apps/r12
      /d02/apps/r11
   You must know the operating system to completely own
   the system


                  Vulnerabilities in Oracle Financials - Joxean
                                      Koret
Vulnerabilities




 Vulnerabilities in Oracle Financials - Joxean
                     Koret
Vulnerabilities by component
Middle-tier
   Oracle Forms
   PL/SQL gateway (only in version 11i)
   JSP
Database backend
   Oracle Database
Middle-tier (again)
   The Printers From Hell



                  Vulnerabilities in Oracle Financials - Joxean
                                      Koret
Vulnerabilities: Cross Site Scripting

 Oracle Financials is full of XSS vulnerabilities
 In example, the script biserror.jsp is designed to
 show an error page with a custom message
 The message text can be HTML code
   By design!




                Vulnerabilities in Oracle Financials - Joxean
                                    Koret
XSS in biserror.jsp




   Vulnerabilities in Oracle Financials - Joxean
                       Koret
Vulnerabilities

Cross Site Scripting vulnerabilities can only be
usefull (when you do not have real exploits) for:
  Session hijacking
  Phissing
  Manipulating admin panels
  Etc...
However, there are many very interesting
vulnerabilities in Oracle Financials so, ignore
XSS ;)
              Vulnerabilities in Oracle Financials - Joxean
                                  Koret
Mistakes

The very first vulnerability I found in Oracle Financials 11i
was only applicable to AIX (unfortunately)
The SYSADMIN has the responsibility (role) SYSADMIN
Looking for other users with the same responsibility...
   ...




                  Vulnerabilities in Oracle Financials - Joxean
                                      Koret
Mistakes

The very first vulnerability I found in Oracle Financials 11i
was only applicable to AIX (unfortunately)
The SYSADMIN has the responsibility (role) SYSADMIN
Looking for other users with the same responsibility...
   The GUEST user appears! So any GUEST user is, in
   fact, SYSADMIN!!!
      Cool!
Applicable to all Oracle Apps. 11i versions for AIX



                  Vulnerabilities in Oracle Financials - Joxean
                                      Koret
For the developers...




    Vulnerabilities in Oracle Financials - Joxean
                        Koret
Oracle Forms

One of the more interesting vulnerabilities is in
the Oracle Forms Listener.
Whenever a new user wants to connect to
Oracle Forms via web, a Login Form is shown
  Is a Java Applet




               Vulnerabilities in Oracle Financials - Joxean
                                   Koret
The Login Form




 Vulnerabilities in Oracle Financials - Joxean
                     Koret
Oracle Forms Listener

But, how is the form loaded? What parameters
are given from the browser to the server if any?
  Remember, it's a Java applet that communicates
  with the application server




              Vulnerabilities in Oracle Financials - Joxean
                                  Koret
Oracle Forms Listener

Answer:




          Vulnerabilities in Oracle Financials - Joxean
                              Koret
Oracle Forms Listener

So, again, we have another installation path
disclosure but, wait...
What if you're able to upload a new form to the
server, to a temporary path, in example?
  The form will be executed before doing logon
Possible temporary paths:
  /incoming
  /tmp

              Vulnerabilities in Oracle Financials - Joxean
                                  Koret
Oracle Forms Listener

The source code of almost every form in Oracle
Financials is available:
  Source code for login form is in
  $FND_TOP/US/FNDSCSGN.fmb




              Vulnerabilities in Oracle Financials - Joxean
                                  Koret
Oracle Forms Source
$ cd $FND_TOP

$ pwd

/u03/oracle/prodappl/fnd/11.5.0/
$ cd forms

$ ls

E US
$ ls US/

APPTREE.fmx FNDATENT.fmx FNDCPDIA.fmx FNDCUSTM.fmx FNDFFMIS.fmx

FNDFMFUN.fmx FNDPOMPV.fmx FNDSCAUS.fmx FNDSNDSQ.fmx FNDADDSQ.fmx

FNDATFUN.fmx FNDCPDPD.fmx FNDFBMAS.fmx FNDFFMSA.fmx FNDLVMLU.fmx

FNDPOMSV.fmx FNDSCDDG.fmx TEMPLATE.fmx (...)




                               Vulnerabilities in Oracle Financials - Joxean
                                                   Koret
Old Vulnerabilities: PL/SQL Gateway

 In the prior version (Oracle Financials 11i)
 almost all the vulnerabilities I found were SQL
 Injection or ”mistakes”
   Thanks to the PL/SQL Gateway
 I'm going to tell you about various of them
 Sorry, no demo for this version :(



               Vulnerabilities in Oracle Financials - Joxean
                                   Koret
The PL/SQL Gateway

What is the PL/SQL Gateway?
Is a way to directly execute PL/SQL code in the
database via a browser




             Vulnerabilities in Oracle Financials - Joxean
                                 Koret
The PL/SQL Gateway

What is the PL/SQL Gateway?
Is a way to directly execute PL/SQL code in the
database via a browser
  ”Where you see a feature I see a flaw!”
What if the PL/SQL code contains
vulnerabilities?



               Vulnerabilities in Oracle Financials - Joxean
                                   Koret
The PL/SQL Gateway

Remember, the PL/SQL Gateway is a way to
directly execute PL/SQL code in the database
via a browser
  ”Where you see a feature I see a flaw!”
What if the PL/SQL code contains
vulnerabilities?
  You're running code directly in the database
  You can run any procedure granted to public
    A lot of them, about thousands in total
  Cool!         Vulnerabilities in Oracle Financials - Joxean
                                    Koret
Some reported & fixed vulnerabilities

http://<target>/pls/<DAD>/ADI_display_report.
DisplayFile?P_DOCID=<doc id>
http://<target>/pls/<DAD>/ADI_BINARY_FILE.
Show?p_DocumentId=<doc id>
Download any document stored in the ERP
(contracts, etc...) without being authenticated
Just brute force the doc_id and that's all


              Vulnerabilities in Oracle Financials - Joxean
                                  Koret
PL/SQL Gateway

But, wait! I don't know the DAD?
OK, simply navigate with your browser to the following
location:
  http://<target>:<port>/pls/
You will be redirected to the URL /pls/DAD/fnd_web.ping
In Oracle Apps since 11.5.10.2 you will get the message
”Unauthorized”
  But, well, when accessing to the URL you were
  redirected to...

                 Vulnerabilities in Oracle Financials - Joxean
                                     Koret
More vulnerabilities in Apps 11i

How can I see the complete list of customers
and contacts of my adversary corporation?




             Vulnerabilities in Oracle Financials - Joxean
                                 Koret
More vulnerabilities in Apps 11i

How can I see the complete list of customers
and contacts of my adversary corporation?
Easy! The following URL is your answer:
  /pls/<DAD>/ICXSUPWF.DISPLAYCONTACTS
No check for valid session, valid privileges,
etc...
The complete list of customers and contacts
is printed in the web page
  Cool++!    Vulnerabilities in Oracle Financials - Joxean
                                 Koret
SQL Injection

Another vulnerable package (the name says that it's surely
vulnerable)
  /pls/DAD/ICX_UTIL.LOVVALUES
A LOV, in Oracle language, is a List Of Values
  Typically, an SQL query to show some data
The script receives 2 cool parameters:
  c_where_clause & c_js_where_clause
Guess what is the purpose of the parameters?
  Cool^2

                 Vulnerabilities in Oracle Financials - Joxean
                                     Koret
Returning back to ICXSUPWF.DISPLAYCONTACTS


 Do you remember the package to download the
 complete customer's list?
 Well, this package also receives a seemingly
 equal parameter:
   p_where
 Of course, this is one SQL's where clause



              Vulnerabilities in Oracle Financials - Joxean
                                  Koret
Sufficient SQL Injections

OK, we have sufficient ”SQL injections?” (or
design flaws?) for now but, what can I do with
them?
Well, some facts:
  You're running your SQL code as the APPS user
  The APPS user is the owner of the ERP's data
    So you're the new owner of the data :)
  Also, the APPS user has granted the DBA role
    So you're also the new DBA
                Vulnerabilities in Oracle Financials - Joxean
                                    Koret
Oracle Database User APPS

Running SQL code as any DBA you can do whatever you want
as, in example:
  Create a Java procedure to execute OS commands and to
  connect back to you
  Create a PL/SQL backdoor to make ”easier?” executing new
  commands
  Execute a funny OS + RMAN command:
     $ rman target /
     rman> sql 'shutdown abort'
     rman> drop database including backups noprompt;
        And kill her wife if possible

                    Vulnerabilities in Oracle Financials - Joxean
                                        Koret
Oracle Financials R12

I think that I showed sufficient (old, fixed) Oracle
Apps 11i vulnerabilities
Now, it's time for Oracle Applications R12




               Vulnerabilities in Oracle Financials - Joxean
                                   Koret
Oracle Applications R12: Changes

In this version Oracle removed the PL/SQL
Gateway
  No fun :(
But they ported almost all the packages to JSP
So the unique change for us is that we don't
need a DAD this time, we already know the
complete URL to access every JSP
  http://<target>:<port>/OA_HTML/<yourjsp.jsp>

              Vulnerabilities in Oracle Financials - Joxean
                                  Koret
Oracle Applications R12: Changes

In this version they check in almost all JSP
scripts for a valid session, except for allowed to
GUEST applications
However, we can still get fun ;)




              Vulnerabilities in Oracle Financials - Joxean
                                  Koret
Establishing a GUEST session

To establish a GUEST session you just need to
navigate to any ”allowed to GUEST” jsp and,
automagically, a new session will be created for
you




              Vulnerabilities in Oracle Financials - Joxean
                                  Koret
Guest Sessions
When you want to do logon via the web page you're received
with a web page similar if not equal to the following one:




                  Vulnerabilities in Oracle Financials - Joxean
                                      Koret
Guest Sessions

When you do logon correctly you're redirected to the
following web page:




                 Vulnerabilities in Oracle Financials - Joxean
                                     Koret
Guest Sessions

If you navigate (before doing logon) directly to
this web page an exception occurs but a new
GUEST session gets created.




              Vulnerabilities in Oracle Financials - Joxean
                                  Koret
Servlet's Source Code




     Vulnerabilities in Oracle Financials - Joxean
                         Koret
Guest Sessions

With a valid GUEST session we can, now,
access any JSP.
  But some of them will check if we have the correct
  privileges or simply fail because we're not
  SYSADMIN, etc...
  Anyway, our attack vector has significantly
  increased :)




               Vulnerabilities in Oracle Financials - Joxean
                                   Koret
Oracle Financials R12

OK so... Do you remember the flaws where you
can inject any where clause in Oracle Apps 11i?
Well, Oracle always surprised me...




             Vulnerabilities in Oracle Financials - Joxean
                                 Koret
Oracle Applications R12

In this version they added a cool script called
jtfwcpnt.jsp.
It is a component of the Oracle Financials
CRM
  In Oracle words:
     “A Card Paint to display cards in Smart List
     Search”
     Questions to Larry Ellison, plz!
The script is completely flawed.
              Vulnerabilities in Oracle Financials - Joxean
                                  Koret
jtfwcpnt.jsp

This cool script receives one interesting
parameter:
  query
Do I need to explain something else?




              Vulnerabilities in Oracle Financials - Joxean
                                  Koret
jtfwcpnt.jsp

This cool script receives one interesting
parameter:
  query
Do I need to explain something else?
Let's see a very complicated exploit...




              Vulnerabilities in Oracle Financials - Joxean
                                  Koret
jtfwcnpt.jsp 0days 3xpl01ts

$ export TARGET=”http://<target>:<port>/OA_HTML”
$ wget -O - “$TARGET/OA.jsp”
"$TARGET/jtfwcpnt.jsp?query=begin%20execute%20immediate%20'
grant%20dba%20to%20mom';%20end;”
$ wget -O - “$TARGET/OA.jsp”
"$TARGET/jtfwcpnt.jsp?query=begin%20execute%20immediate%20'
delete%20from%20apps.fnd_user';%20commit;end;”




                  Vulnerabilities in Oracle Financials - Joxean
                                      Koret
Creating a new SYSADMIN user

We're running code as the APPS user so,
again, we're the new owner of the data
  So we can, in example, create a new SYSADMIN
  like user:




             Vulnerabilities in Oracle Financials - Joxean
                                 Koret
Vulnerabilities in Oracle Financials - Joxean
                    Koret
Responsibilities

Running this PL/SQL code via the jtfwcpnt.jsp
script we create a new user and assign 2
responsibilities:
  20420 – System Administrator (SYSADMIN)
  20872 – System Administration




              Vulnerabilities in Oracle Financials - Joxean
                                  Koret
Owning by tiers

Abusing from this flaw we gained access to the
database backend
  If we just want to extract some data, we're done,
  delete the created user and that's all
However, if we want to continue owning all the
rest of the tiers we need to find a way to
execute code also in the middle-tier
  Remember, we gained access to the database and
  it will be in a different box :(

               Vulnerabilities in Oracle Financials - Joxean
                                   Koret
Gaining Access to the Middle-tiers

How can we gain access to the middle-tiers?
  Checked for a flawed JSP that writes something to
  disk, but nothing was found
  Checked also for Runtime.getRuntime() and so on:
  No luck :(




              Vulnerabilities in Oracle Financials - Joxean
                                  Koret
Gaining Access to the Middle-tiers

How can we gain access to the middle-tiers?
  Checked for a flawed JSP that writes something to
  disk, but nothing was found
  Checked also for Runtime.getRuntime() and so on:
  No luck :(
  But found a funny technique:
    The Printer From Hell




               Vulnerabilities in Oracle Financials - Joxean
                                   Koret
The Printers From Hell




     Vulnerabilities in Oracle Financials - Joxean
                         Koret
The Printer From Hell

Oracle Applications Server is a web based
application
It's designed to be used by big companies
either connected from LAN or from Internet
They designed a way to print to one system
administrator specified printer from anywhere
But, how are the printers configured?
  Administrator does this via the ERP or directly inserting
  into the database
                Vulnerabilities in Oracle Financials - Joxean
                                    Koret
The Printer From Hell




    Vulnerabilities in Oracle Financials - Joxean
                        Koret
The Printer From Hell

We have a ”printer coming from hell”, just print
something using the ERP or the PL/SQL
packages and you're done




              Vulnerabilities in Oracle Financials - Joxean
                                  Koret
The Printer From Hell

We have a ”printer coming from hell”, just print
something using the ERP or the PL/SQL
packages and you're done
  Th3 c0mpl3t3 $y$t3m w4$ 0wN3|)




              Vulnerabilities in Oracle Financials - Joxean
                                  Koret
However...

We're running code as the ”oracle” OS level
user but I know no way to scalate to root :(
  Well, if the database server is not correctly patched
  we can always use the ”extjob” suid tool
    Vulnerability CVE-2008-2613
But, what if the system is a Win32 box?
  Don't worry! You're already running code as Local
  System :)


               Vulnerabilities in Oracle Financials - Joxean
                                   Koret
●   Conclussions




Vulnerabilities in Oracle Financials - Joxean
                    Koret
Oracle Financials R12

It's getting better in some aspects but there are plenty of
quite stupid vulnerabilities
It's OK (in my opinion) to run it in our companies as an
intranet application but you should take care opening
connectivity to Oracle Financials from Internet
   IMHO...




                  Vulnerabilities in Oracle Financials - Joxean
                                      Koret
Final Conclussion?




   Vulnerabilities in Oracle Financials - Joxean
                       Koret
The End

●   Thanks you folks!




Vulnerabilities in Oracle Financials - Joxean
                    Koret

Más contenido relacionado

Destacado

Webinar: Visionary Analysis Of Oracle R12 Purchasing Application
Webinar: Visionary Analysis Of Oracle R12 Purchasing ApplicationWebinar: Visionary Analysis Of Oracle R12 Purchasing Application
Webinar: Visionary Analysis Of Oracle R12 Purchasing ApplicationiWare Logic Technologies Pvt. Ltd.
 
Presentation done in GENPACT
Presentation done in GENPACTPresentation done in GENPACT
Presentation done in GENPACTDr. Amit Kapoor
 
R12 india localization guide
R12 india localization guideR12 india localization guide
R12 india localization guidekingshuk_goswami
 
Oracle R12 EBS Performance Tuning
Oracle R12 EBS Performance TuningOracle R12 EBS Performance Tuning
Oracle R12 EBS Performance TuningScott Jenner
 
Oracle applications sla r12 SLA- demos
Oracle applications sla r12   SLA- demosOracle applications sla r12   SLA- demos
Oracle applications sla r12 SLA- demosAli Ibrahim
 
Webinar: Oracle R12 Warehouse Management System (WMS) Overview
Webinar: Oracle R12 Warehouse Management System (WMS) OverviewWebinar: Oracle R12 Warehouse Management System (WMS) Overview
Webinar: Oracle R12 Warehouse Management System (WMS) OverviewiWare Logic Technologies Pvt. Ltd.
 
Oracle tips and tricks
Oracle tips and tricksOracle tips and tricks
Oracle tips and tricksYanli Liu
 
Oracle ebs overview 1
Oracle ebs overview 1 Oracle ebs overview 1
Oracle ebs overview 1 Sovanlal Das
 
Introduction to Oracle Financials
Introduction to Oracle FinancialsIntroduction to Oracle Financials
Introduction to Oracle Financialshasan2000
 

Destacado (18)

Webinar: Visionary Analysis Of Oracle R12 Purchasing Application
Webinar: Visionary Analysis Of Oracle R12 Purchasing ApplicationWebinar: Visionary Analysis Of Oracle R12 Purchasing Application
Webinar: Visionary Analysis Of Oracle R12 Purchasing Application
 
Presentation done in GENPACT
Presentation done in GENPACTPresentation done in GENPACT
Presentation done in GENPACT
 
Oracle Application Differences & Drop Ship Sales Orders
Oracle Application Differences & Drop Ship Sales OrdersOracle Application Differences & Drop Ship Sales Orders
Oracle Application Differences & Drop Ship Sales Orders
 
New Enhancements + Upgrade Path to Oracle EBS R12.1.3
New Enhancements + Upgrade Path to Oracle EBS R12.1.3New Enhancements + Upgrade Path to Oracle EBS R12.1.3
New Enhancements + Upgrade Path to Oracle EBS R12.1.3
 
OBIEE 11g Overview | Free Webcast
OBIEE 11g Overview | Free WebcastOBIEE 11g Overview | Free Webcast
OBIEE 11g Overview | Free Webcast
 
R12 india localization guide
R12 india localization guideR12 india localization guide
R12 india localization guide
 
Customizing Oracle EBS OA Framework
Customizing Oracle EBS OA FrameworkCustomizing Oracle EBS OA Framework
Customizing Oracle EBS OA Framework
 
Summary Account R12 General Ledger
Summary Account R12 General LedgerSummary Account R12 General Ledger
Summary Account R12 General Ledger
 
Webcast: BUDGETING - R12.1.3 ORACLE GENERAL LEDGER
Webcast: BUDGETING - R12.1.3 ORACLE GENERAL LEDGERWebcast: BUDGETING - R12.1.3 ORACLE GENERAL LEDGER
Webcast: BUDGETING - R12.1.3 ORACLE GENERAL LEDGER
 
Oracle R12 EBS Performance Tuning
Oracle R12 EBS Performance TuningOracle R12 EBS Performance Tuning
Oracle R12 EBS Performance Tuning
 
Supporting References in Oracle EBS R12
Supporting References in Oracle EBS R12Supporting References in Oracle EBS R12
Supporting References in Oracle EBS R12
 
Oracle applications sla r12 SLA- demos
Oracle applications sla r12   SLA- demosOracle applications sla r12   SLA- demos
Oracle applications sla r12 SLA- demos
 
Sla and cost acctg
Sla and cost acctgSla and cost acctg
Sla and cost acctg
 
Webinar: Oracle R12 Warehouse Management System (WMS) Overview
Webinar: Oracle R12 Warehouse Management System (WMS) OverviewWebinar: Oracle R12 Warehouse Management System (WMS) Overview
Webinar: Oracle R12 Warehouse Management System (WMS) Overview
 
Multiperiod Accounting in Oracle EBS R12
Multiperiod Accounting in Oracle EBS R12Multiperiod Accounting in Oracle EBS R12
Multiperiod Accounting in Oracle EBS R12
 
Oracle tips and tricks
Oracle tips and tricksOracle tips and tricks
Oracle tips and tricks
 
Oracle ebs overview 1
Oracle ebs overview 1 Oracle ebs overview 1
Oracle ebs overview 1
 
Introduction to Oracle Financials
Introduction to Oracle FinancialsIntroduction to Oracle Financials
Introduction to Oracle Financials
 

Más de RootedCON

Rooted2020 A clockwork pentester - Jose Carlos Moral & Alvaro Villaverde
Rooted2020 A clockwork pentester - Jose Carlos Moral & Alvaro VillaverdeRooted2020 A clockwork pentester - Jose Carlos Moral & Alvaro Villaverde
Rooted2020 A clockwork pentester - Jose Carlos Moral & Alvaro VillaverdeRootedCON
 
rooted2020 Sandbox fingerprinting -_evadiendo_entornos_de_analisis_-_victor_c...
rooted2020 Sandbox fingerprinting -_evadiendo_entornos_de_analisis_-_victor_c...rooted2020 Sandbox fingerprinting -_evadiendo_entornos_de_analisis_-_victor_c...
rooted2020 Sandbox fingerprinting -_evadiendo_entornos_de_analisis_-_victor_c...RootedCON
 
Rooted2020 hunting malware-using_process_behavior-roberto_amado
Rooted2020 hunting malware-using_process_behavior-roberto_amadoRooted2020 hunting malware-using_process_behavior-roberto_amado
Rooted2020 hunting malware-using_process_behavior-roberto_amadoRootedCON
 
Rooted2020 compliance as-code_-_guillermo_obispo_-_jose_mariaperez_-_
Rooted2020 compliance as-code_-_guillermo_obispo_-_jose_mariaperez_-_Rooted2020 compliance as-code_-_guillermo_obispo_-_jose_mariaperez_-_
Rooted2020 compliance as-code_-_guillermo_obispo_-_jose_mariaperez_-_RootedCON
 
Rooted2020 the day i_ruled_the_world_deceiving_software_developers_through_op...
Rooted2020 the day i_ruled_the_world_deceiving_software_developers_through_op...Rooted2020 the day i_ruled_the_world_deceiving_software_developers_through_op...
Rooted2020 the day i_ruled_the_world_deceiving_software_developers_through_op...RootedCON
 
Rooted2020 si la-empresa_ha_ocultado_el_ciberataque,_como_se_ha_enterado_el_r...
Rooted2020 si la-empresa_ha_ocultado_el_ciberataque,_como_se_ha_enterado_el_r...Rooted2020 si la-empresa_ha_ocultado_el_ciberataque,_como_se_ha_enterado_el_r...
Rooted2020 si la-empresa_ha_ocultado_el_ciberataque,_como_se_ha_enterado_el_r...RootedCON
 
Rooted2020 wordpress-another_terror_story_-_manuel_garcia_-_jacinto_sergio_ca...
Rooted2020 wordpress-another_terror_story_-_manuel_garcia_-_jacinto_sergio_ca...Rooted2020 wordpress-another_terror_story_-_manuel_garcia_-_jacinto_sergio_ca...
Rooted2020 wordpress-another_terror_story_-_manuel_garcia_-_jacinto_sergio_ca...RootedCON
 
Rooted2020 Atacando comunicaciones-de_voz_cifradas_-_jose_luis_verdeguer
Rooted2020 Atacando comunicaciones-de_voz_cifradas_-_jose_luis_verdeguerRooted2020 Atacando comunicaciones-de_voz_cifradas_-_jose_luis_verdeguer
Rooted2020 Atacando comunicaciones-de_voz_cifradas_-_jose_luis_verdeguerRootedCON
 
rooted2020-Rootkit necurs no_es_un_bug,_es_una_feature_-_roberto_santos_-_jav...
rooted2020-Rootkit necurs no_es_un_bug,_es_una_feature_-_roberto_santos_-_jav...rooted2020-Rootkit necurs no_es_un_bug,_es_una_feature_-_roberto_santos_-_jav...
rooted2020-Rootkit necurs no_es_un_bug,_es_una_feature_-_roberto_santos_-_jav...RootedCON
 
Rooted2020 stefano maccaglia--_the_enemy_of_my_enemy
Rooted2020 stefano maccaglia--_the_enemy_of_my_enemyRooted2020 stefano maccaglia--_the_enemy_of_my_enemy
Rooted2020 stefano maccaglia--_the_enemy_of_my_enemyRootedCON
 
Rooted2020 taller de-reversing_de_binarios_escritos_en_golang_-_mariano_palom...
Rooted2020 taller de-reversing_de_binarios_escritos_en_golang_-_mariano_palom...Rooted2020 taller de-reversing_de_binarios_escritos_en_golang_-_mariano_palom...
Rooted2020 taller de-reversing_de_binarios_escritos_en_golang_-_mariano_palom...RootedCON
 
Rooted2020 virtual pwned-network_-_manel_molina
Rooted2020 virtual pwned-network_-_manel_molinaRooted2020 virtual pwned-network_-_manel_molina
Rooted2020 virtual pwned-network_-_manel_molinaRootedCON
 
Rooted2020 van a-mear_sangre_como_hacer_que_los_malos_lo_paguen_muy_caro_-_an...
Rooted2020 van a-mear_sangre_como_hacer_que_los_malos_lo_paguen_muy_caro_-_an...Rooted2020 van a-mear_sangre_como_hacer_que_los_malos_lo_paguen_muy_caro_-_an...
Rooted2020 van a-mear_sangre_como_hacer_que_los_malos_lo_paguen_muy_caro_-_an...RootedCON
 
Rooted2020 todo a-siem_-_marta_lopez
Rooted2020 todo a-siem_-_marta_lopezRooted2020 todo a-siem_-_marta_lopez
Rooted2020 todo a-siem_-_marta_lopezRootedCON
 
Rooted2020 roapt evil-mass_storage_-_tu-ya_aqui_-_david_reguera_-_abel_valero
Rooted2020 roapt evil-mass_storage_-_tu-ya_aqui_-_david_reguera_-_abel_valeroRooted2020 roapt evil-mass_storage_-_tu-ya_aqui_-_david_reguera_-_abel_valero
Rooted2020 roapt evil-mass_storage_-_tu-ya_aqui_-_david_reguera_-_abel_valeroRootedCON
 
Rooted2020 live coding--_jesus_jara
Rooted2020 live coding--_jesus_jaraRooted2020 live coding--_jesus_jara
Rooted2020 live coding--_jesus_jaraRootedCON
 
Rooted2020 legalidad de-la_prueba_tecnologica_indiciaria_cuando_tu_papi_es_un...
Rooted2020 legalidad de-la_prueba_tecnologica_indiciaria_cuando_tu_papi_es_un...Rooted2020 legalidad de-la_prueba_tecnologica_indiciaria_cuando_tu_papi_es_un...
Rooted2020 legalidad de-la_prueba_tecnologica_indiciaria_cuando_tu_papi_es_un...RootedCON
 
Rooted2020 hackeando el-mundo_exterior_a_traves_de_bluetooth_low-energy_ble_-...
Rooted2020 hackeando el-mundo_exterior_a_traves_de_bluetooth_low-energy_ble_-...Rooted2020 hackeando el-mundo_exterior_a_traves_de_bluetooth_low-energy_ble_-...
Rooted2020 hackeando el-mundo_exterior_a_traves_de_bluetooth_low-energy_ble_-...RootedCON
 
Rooted2020 evading deep-learning_malware_detectors_-_javier_yuste
Rooted2020 evading deep-learning_malware_detectors_-_javier_yusteRooted2020 evading deep-learning_malware_detectors_-_javier_yuste
Rooted2020 evading deep-learning_malware_detectors_-_javier_yusteRootedCON
 
Rooted2020 encontrando 0days-en_2020_-_antonio_morales
Rooted2020 encontrando 0days-en_2020_-_antonio_moralesRooted2020 encontrando 0days-en_2020_-_antonio_morales
Rooted2020 encontrando 0days-en_2020_-_antonio_moralesRootedCON
 

Más de RootedCON (20)

Rooted2020 A clockwork pentester - Jose Carlos Moral & Alvaro Villaverde
Rooted2020 A clockwork pentester - Jose Carlos Moral & Alvaro VillaverdeRooted2020 A clockwork pentester - Jose Carlos Moral & Alvaro Villaverde
Rooted2020 A clockwork pentester - Jose Carlos Moral & Alvaro Villaverde
 
rooted2020 Sandbox fingerprinting -_evadiendo_entornos_de_analisis_-_victor_c...
rooted2020 Sandbox fingerprinting -_evadiendo_entornos_de_analisis_-_victor_c...rooted2020 Sandbox fingerprinting -_evadiendo_entornos_de_analisis_-_victor_c...
rooted2020 Sandbox fingerprinting -_evadiendo_entornos_de_analisis_-_victor_c...
 
Rooted2020 hunting malware-using_process_behavior-roberto_amado
Rooted2020 hunting malware-using_process_behavior-roberto_amadoRooted2020 hunting malware-using_process_behavior-roberto_amado
Rooted2020 hunting malware-using_process_behavior-roberto_amado
 
Rooted2020 compliance as-code_-_guillermo_obispo_-_jose_mariaperez_-_
Rooted2020 compliance as-code_-_guillermo_obispo_-_jose_mariaperez_-_Rooted2020 compliance as-code_-_guillermo_obispo_-_jose_mariaperez_-_
Rooted2020 compliance as-code_-_guillermo_obispo_-_jose_mariaperez_-_
 
Rooted2020 the day i_ruled_the_world_deceiving_software_developers_through_op...
Rooted2020 the day i_ruled_the_world_deceiving_software_developers_through_op...Rooted2020 the day i_ruled_the_world_deceiving_software_developers_through_op...
Rooted2020 the day i_ruled_the_world_deceiving_software_developers_through_op...
 
Rooted2020 si la-empresa_ha_ocultado_el_ciberataque,_como_se_ha_enterado_el_r...
Rooted2020 si la-empresa_ha_ocultado_el_ciberataque,_como_se_ha_enterado_el_r...Rooted2020 si la-empresa_ha_ocultado_el_ciberataque,_como_se_ha_enterado_el_r...
Rooted2020 si la-empresa_ha_ocultado_el_ciberataque,_como_se_ha_enterado_el_r...
 
Rooted2020 wordpress-another_terror_story_-_manuel_garcia_-_jacinto_sergio_ca...
Rooted2020 wordpress-another_terror_story_-_manuel_garcia_-_jacinto_sergio_ca...Rooted2020 wordpress-another_terror_story_-_manuel_garcia_-_jacinto_sergio_ca...
Rooted2020 wordpress-another_terror_story_-_manuel_garcia_-_jacinto_sergio_ca...
 
Rooted2020 Atacando comunicaciones-de_voz_cifradas_-_jose_luis_verdeguer
Rooted2020 Atacando comunicaciones-de_voz_cifradas_-_jose_luis_verdeguerRooted2020 Atacando comunicaciones-de_voz_cifradas_-_jose_luis_verdeguer
Rooted2020 Atacando comunicaciones-de_voz_cifradas_-_jose_luis_verdeguer
 
rooted2020-Rootkit necurs no_es_un_bug,_es_una_feature_-_roberto_santos_-_jav...
rooted2020-Rootkit necurs no_es_un_bug,_es_una_feature_-_roberto_santos_-_jav...rooted2020-Rootkit necurs no_es_un_bug,_es_una_feature_-_roberto_santos_-_jav...
rooted2020-Rootkit necurs no_es_un_bug,_es_una_feature_-_roberto_santos_-_jav...
 
Rooted2020 stefano maccaglia--_the_enemy_of_my_enemy
Rooted2020 stefano maccaglia--_the_enemy_of_my_enemyRooted2020 stefano maccaglia--_the_enemy_of_my_enemy
Rooted2020 stefano maccaglia--_the_enemy_of_my_enemy
 
Rooted2020 taller de-reversing_de_binarios_escritos_en_golang_-_mariano_palom...
Rooted2020 taller de-reversing_de_binarios_escritos_en_golang_-_mariano_palom...Rooted2020 taller de-reversing_de_binarios_escritos_en_golang_-_mariano_palom...
Rooted2020 taller de-reversing_de_binarios_escritos_en_golang_-_mariano_palom...
 
Rooted2020 virtual pwned-network_-_manel_molina
Rooted2020 virtual pwned-network_-_manel_molinaRooted2020 virtual pwned-network_-_manel_molina
Rooted2020 virtual pwned-network_-_manel_molina
 
Rooted2020 van a-mear_sangre_como_hacer_que_los_malos_lo_paguen_muy_caro_-_an...
Rooted2020 van a-mear_sangre_como_hacer_que_los_malos_lo_paguen_muy_caro_-_an...Rooted2020 van a-mear_sangre_como_hacer_que_los_malos_lo_paguen_muy_caro_-_an...
Rooted2020 van a-mear_sangre_como_hacer_que_los_malos_lo_paguen_muy_caro_-_an...
 
Rooted2020 todo a-siem_-_marta_lopez
Rooted2020 todo a-siem_-_marta_lopezRooted2020 todo a-siem_-_marta_lopez
Rooted2020 todo a-siem_-_marta_lopez
 
Rooted2020 roapt evil-mass_storage_-_tu-ya_aqui_-_david_reguera_-_abel_valero
Rooted2020 roapt evil-mass_storage_-_tu-ya_aqui_-_david_reguera_-_abel_valeroRooted2020 roapt evil-mass_storage_-_tu-ya_aqui_-_david_reguera_-_abel_valero
Rooted2020 roapt evil-mass_storage_-_tu-ya_aqui_-_david_reguera_-_abel_valero
 
Rooted2020 live coding--_jesus_jara
Rooted2020 live coding--_jesus_jaraRooted2020 live coding--_jesus_jara
Rooted2020 live coding--_jesus_jara
 
Rooted2020 legalidad de-la_prueba_tecnologica_indiciaria_cuando_tu_papi_es_un...
Rooted2020 legalidad de-la_prueba_tecnologica_indiciaria_cuando_tu_papi_es_un...Rooted2020 legalidad de-la_prueba_tecnologica_indiciaria_cuando_tu_papi_es_un...
Rooted2020 legalidad de-la_prueba_tecnologica_indiciaria_cuando_tu_papi_es_un...
 
Rooted2020 hackeando el-mundo_exterior_a_traves_de_bluetooth_low-energy_ble_-...
Rooted2020 hackeando el-mundo_exterior_a_traves_de_bluetooth_low-energy_ble_-...Rooted2020 hackeando el-mundo_exterior_a_traves_de_bluetooth_low-energy_ble_-...
Rooted2020 hackeando el-mundo_exterior_a_traves_de_bluetooth_low-energy_ble_-...
 
Rooted2020 evading deep-learning_malware_detectors_-_javier_yuste
Rooted2020 evading deep-learning_malware_detectors_-_javier_yusteRooted2020 evading deep-learning_malware_detectors_-_javier_yuste
Rooted2020 evading deep-learning_malware_detectors_-_javier_yuste
 
Rooted2020 encontrando 0days-en_2020_-_antonio_morales
Rooted2020 encontrando 0days-en_2020_-_antonio_moralesRooted2020 encontrando 0days-en_2020_-_antonio_morales
Rooted2020 encontrando 0days-en_2020_-_antonio_morales
 

Último

How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 

Último (20)

How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 

Joxean Koret - Hackproofing Oracle Financials 11i & R12 [RootedCON 2010]

  • 1. Hackproofing Oracle Financials Vulnerabilities in Oracle E-Business Suite R12 Vulnerabilities in Oracle Financials - Joxean Koret
  • 2. What is Oracle Financials? Is an Enterprise Resource Planing product (ERP) The names Oracle E-Business Suite, Oracle Applications, Oracle Financials, etc... does refer to the same product Vulnerabilities in Oracle Financials - Joxean Koret
  • 3. ERP Statistics As of 2005, SAP and Oracle Applications were the most deployed Vulnerabilities in Oracle Financials - Joxean Koret
  • 4. Market Share Vulnerabilities in Oracle Financials - Joxean Koret
  • 5. Market Share Vulnerabilities in Oracle Financials - Joxean Koret
  • 6. Market Share Vulnerabilities in Oracle Financials - Joxean Koret
  • 7. Market Share Vulnerabilities in Oracle Financials - Joxean Koret
  • 8. Who is using Oracle Financials? Very large list of customers http://www.oracle.com/customers/products/financials2.html In short... Militars & Governments, i.e.: North Atlantic Treaty Organization (NATO) Banks Airways & Airlines Petrochemical companies Hospitals ... Vulnerabilities in Oracle Financials - Joxean Koret
  • 9. Some well known customers Marvel, Banque de France, U.S. Airways, U.S. Navy, U.S. Army, Mitsubishi, Airtel, NH Hotels, Canon, EMC Corporation, Flemish Government, Fujitsu, Toshiba, Google Inc, Unisys, U.S. Postal Service, Toyota, General Electrics, Dubai's Government, Oracle itself, etc... Enough (and interesting) customers to care about ;) Vulnerabilities in Oracle Financials - Joxean Koret
  • 10. About the talk What are we going to covert in this talk? Architecture overview (Basic Concepts + Brief introduction) Components (11i & R12) Design flaws Vulnerabilities How to own Vulnerabilities in Oracle Financials - Joxean Koret
  • 11. Architecture Overview Vulnerabilities in Oracle Financials - Joxean Koret
  • 12. Architecture: Attacker's point of view Applications Server's components Web Server, Forms Server (& Reports Server) But Reports is not always available from internet JSP, Servlets, CGIs and ”the” PL/SQL Gateway PL/SQL Gateway removed in R12 due to many security problems Database Server's components Data PL/SQL software Vulnerabilities in Oracle Financials - Joxean Koret
  • 13. Basic Concepts Forms Server Java Applet that communicates (via HTTP in the latest versions) with the application server Used to show GUIs Reports Server The same but only for reports PL/SQL Gateway A way to execute PL/SQL code directly from a browser, like a CGI but inside the database Vulnerabilities in Oracle Financials - Joxean Koret
  • 14. Information Gathering Vulnerabilities in Oracle Financials - Joxean Koret
  • 15. Information Gathering Oracle Financials 11i http://middletier/pls/DAD/fnd_web.ping Oracle Financials R12 PL/SQL Gateway removed, URL changed to: http://middletier/OA_HTML/jsp/fnd/fndping.jsp What information we get this way? Vulnerabilities in Oracle Financials - Joxean Koret
  • 16. Information Gathered Vulnerabilities in Oracle Financials - Joxean Koret
  • 17. Information Gathering Install Path Disclosure Vulnerabilities in Oracle Financials - Joxean Koret
  • 18. Install Path Disclosure The script /OA_HTML/biserror.jsp receives a parameter called ”DBC” (DataBase Configuration) Is a file in the middle-tier with information regarding the database address, etc... It reveals the installation path when a non-existent DBC file is given to script Vulnerabilities in Oracle Financials - Joxean Koret
  • 19. Installation Path Disclosure Vulnerabilities in Oracle Financials - Joxean Koret
  • 20. Information Gathering The information retrieval (sometimes) is vital for succesful intrusions Databases's SID and schema (commonly APPS) It's also typical to host multiple Oracle Financials instances in the same machine: /d01/apps/r12 /d02/apps/r11 You must know the operating system to completely own the system Vulnerabilities in Oracle Financials - Joxean Koret
  • 21. Vulnerabilities Vulnerabilities in Oracle Financials - Joxean Koret
  • 22. Vulnerabilities by component Middle-tier Oracle Forms PL/SQL gateway (only in version 11i) JSP Database backend Oracle Database Middle-tier (again) The Printers From Hell Vulnerabilities in Oracle Financials - Joxean Koret
  • 23. Vulnerabilities: Cross Site Scripting Oracle Financials is full of XSS vulnerabilities In example, the script biserror.jsp is designed to show an error page with a custom message The message text can be HTML code By design! Vulnerabilities in Oracle Financials - Joxean Koret
  • 24. XSS in biserror.jsp Vulnerabilities in Oracle Financials - Joxean Koret
  • 25. Vulnerabilities Cross Site Scripting vulnerabilities can only be usefull (when you do not have real exploits) for: Session hijacking Phissing Manipulating admin panels Etc... However, there are many very interesting vulnerabilities in Oracle Financials so, ignore XSS ;) Vulnerabilities in Oracle Financials - Joxean Koret
  • 26. Mistakes The very first vulnerability I found in Oracle Financials 11i was only applicable to AIX (unfortunately) The SYSADMIN has the responsibility (role) SYSADMIN Looking for other users with the same responsibility... ... Vulnerabilities in Oracle Financials - Joxean Koret
  • 27. Mistakes The very first vulnerability I found in Oracle Financials 11i was only applicable to AIX (unfortunately) The SYSADMIN has the responsibility (role) SYSADMIN Looking for other users with the same responsibility... The GUEST user appears! So any GUEST user is, in fact, SYSADMIN!!! Cool! Applicable to all Oracle Apps. 11i versions for AIX Vulnerabilities in Oracle Financials - Joxean Koret
  • 28. For the developers... Vulnerabilities in Oracle Financials - Joxean Koret
  • 29. Oracle Forms One of the more interesting vulnerabilities is in the Oracle Forms Listener. Whenever a new user wants to connect to Oracle Forms via web, a Login Form is shown Is a Java Applet Vulnerabilities in Oracle Financials - Joxean Koret
  • 30. The Login Form Vulnerabilities in Oracle Financials - Joxean Koret
  • 31. Oracle Forms Listener But, how is the form loaded? What parameters are given from the browser to the server if any? Remember, it's a Java applet that communicates with the application server Vulnerabilities in Oracle Financials - Joxean Koret
  • 32. Oracle Forms Listener Answer: Vulnerabilities in Oracle Financials - Joxean Koret
  • 33. Oracle Forms Listener So, again, we have another installation path disclosure but, wait... What if you're able to upload a new form to the server, to a temporary path, in example? The form will be executed before doing logon Possible temporary paths: /incoming /tmp Vulnerabilities in Oracle Financials - Joxean Koret
  • 34. Oracle Forms Listener The source code of almost every form in Oracle Financials is available: Source code for login form is in $FND_TOP/US/FNDSCSGN.fmb Vulnerabilities in Oracle Financials - Joxean Koret
  • 35. Oracle Forms Source $ cd $FND_TOP $ pwd /u03/oracle/prodappl/fnd/11.5.0/ $ cd forms $ ls E US $ ls US/ APPTREE.fmx FNDATENT.fmx FNDCPDIA.fmx FNDCUSTM.fmx FNDFFMIS.fmx FNDFMFUN.fmx FNDPOMPV.fmx FNDSCAUS.fmx FNDSNDSQ.fmx FNDADDSQ.fmx FNDATFUN.fmx FNDCPDPD.fmx FNDFBMAS.fmx FNDFFMSA.fmx FNDLVMLU.fmx FNDPOMSV.fmx FNDSCDDG.fmx TEMPLATE.fmx (...) Vulnerabilities in Oracle Financials - Joxean Koret
  • 36. Old Vulnerabilities: PL/SQL Gateway In the prior version (Oracle Financials 11i) almost all the vulnerabilities I found were SQL Injection or ”mistakes” Thanks to the PL/SQL Gateway I'm going to tell you about various of them Sorry, no demo for this version :( Vulnerabilities in Oracle Financials - Joxean Koret
  • 37. The PL/SQL Gateway What is the PL/SQL Gateway? Is a way to directly execute PL/SQL code in the database via a browser Vulnerabilities in Oracle Financials - Joxean Koret
  • 38. The PL/SQL Gateway What is the PL/SQL Gateway? Is a way to directly execute PL/SQL code in the database via a browser ”Where you see a feature I see a flaw!” What if the PL/SQL code contains vulnerabilities? Vulnerabilities in Oracle Financials - Joxean Koret
  • 39. The PL/SQL Gateway Remember, the PL/SQL Gateway is a way to directly execute PL/SQL code in the database via a browser ”Where you see a feature I see a flaw!” What if the PL/SQL code contains vulnerabilities? You're running code directly in the database You can run any procedure granted to public A lot of them, about thousands in total Cool! Vulnerabilities in Oracle Financials - Joxean Koret
  • 40. Some reported & fixed vulnerabilities http://<target>/pls/<DAD>/ADI_display_report. DisplayFile?P_DOCID=<doc id> http://<target>/pls/<DAD>/ADI_BINARY_FILE. Show?p_DocumentId=<doc id> Download any document stored in the ERP (contracts, etc...) without being authenticated Just brute force the doc_id and that's all Vulnerabilities in Oracle Financials - Joxean Koret
  • 41. PL/SQL Gateway But, wait! I don't know the DAD? OK, simply navigate with your browser to the following location: http://<target>:<port>/pls/ You will be redirected to the URL /pls/DAD/fnd_web.ping In Oracle Apps since 11.5.10.2 you will get the message ”Unauthorized” But, well, when accessing to the URL you were redirected to... Vulnerabilities in Oracle Financials - Joxean Koret
  • 42. More vulnerabilities in Apps 11i How can I see the complete list of customers and contacts of my adversary corporation? Vulnerabilities in Oracle Financials - Joxean Koret
  • 43. More vulnerabilities in Apps 11i How can I see the complete list of customers and contacts of my adversary corporation? Easy! The following URL is your answer: /pls/<DAD>/ICXSUPWF.DISPLAYCONTACTS No check for valid session, valid privileges, etc... The complete list of customers and contacts is printed in the web page Cool++! Vulnerabilities in Oracle Financials - Joxean Koret
  • 44. SQL Injection Another vulnerable package (the name says that it's surely vulnerable) /pls/DAD/ICX_UTIL.LOVVALUES A LOV, in Oracle language, is a List Of Values Typically, an SQL query to show some data The script receives 2 cool parameters: c_where_clause & c_js_where_clause Guess what is the purpose of the parameters? Cool^2 Vulnerabilities in Oracle Financials - Joxean Koret
  • 45. Returning back to ICXSUPWF.DISPLAYCONTACTS Do you remember the package to download the complete customer's list? Well, this package also receives a seemingly equal parameter: p_where Of course, this is one SQL's where clause Vulnerabilities in Oracle Financials - Joxean Koret
  • 46. Sufficient SQL Injections OK, we have sufficient ”SQL injections?” (or design flaws?) for now but, what can I do with them? Well, some facts: You're running your SQL code as the APPS user The APPS user is the owner of the ERP's data So you're the new owner of the data :) Also, the APPS user has granted the DBA role So you're also the new DBA Vulnerabilities in Oracle Financials - Joxean Koret
  • 47. Oracle Database User APPS Running SQL code as any DBA you can do whatever you want as, in example: Create a Java procedure to execute OS commands and to connect back to you Create a PL/SQL backdoor to make ”easier?” executing new commands Execute a funny OS + RMAN command: $ rman target / rman> sql 'shutdown abort' rman> drop database including backups noprompt; And kill her wife if possible Vulnerabilities in Oracle Financials - Joxean Koret
  • 48. Oracle Financials R12 I think that I showed sufficient (old, fixed) Oracle Apps 11i vulnerabilities Now, it's time for Oracle Applications R12 Vulnerabilities in Oracle Financials - Joxean Koret
  • 49. Oracle Applications R12: Changes In this version Oracle removed the PL/SQL Gateway No fun :( But they ported almost all the packages to JSP So the unique change for us is that we don't need a DAD this time, we already know the complete URL to access every JSP http://<target>:<port>/OA_HTML/<yourjsp.jsp> Vulnerabilities in Oracle Financials - Joxean Koret
  • 50. Oracle Applications R12: Changes In this version they check in almost all JSP scripts for a valid session, except for allowed to GUEST applications However, we can still get fun ;) Vulnerabilities in Oracle Financials - Joxean Koret
  • 51. Establishing a GUEST session To establish a GUEST session you just need to navigate to any ”allowed to GUEST” jsp and, automagically, a new session will be created for you Vulnerabilities in Oracle Financials - Joxean Koret
  • 52. Guest Sessions When you want to do logon via the web page you're received with a web page similar if not equal to the following one: Vulnerabilities in Oracle Financials - Joxean Koret
  • 53. Guest Sessions When you do logon correctly you're redirected to the following web page: Vulnerabilities in Oracle Financials - Joxean Koret
  • 54. Guest Sessions If you navigate (before doing logon) directly to this web page an exception occurs but a new GUEST session gets created. Vulnerabilities in Oracle Financials - Joxean Koret
  • 55. Servlet's Source Code Vulnerabilities in Oracle Financials - Joxean Koret
  • 56. Guest Sessions With a valid GUEST session we can, now, access any JSP. But some of them will check if we have the correct privileges or simply fail because we're not SYSADMIN, etc... Anyway, our attack vector has significantly increased :) Vulnerabilities in Oracle Financials - Joxean Koret
  • 57. Oracle Financials R12 OK so... Do you remember the flaws where you can inject any where clause in Oracle Apps 11i? Well, Oracle always surprised me... Vulnerabilities in Oracle Financials - Joxean Koret
  • 58. Oracle Applications R12 In this version they added a cool script called jtfwcpnt.jsp. It is a component of the Oracle Financials CRM In Oracle words: “A Card Paint to display cards in Smart List Search” Questions to Larry Ellison, plz! The script is completely flawed. Vulnerabilities in Oracle Financials - Joxean Koret
  • 59. jtfwcpnt.jsp This cool script receives one interesting parameter: query Do I need to explain something else? Vulnerabilities in Oracle Financials - Joxean Koret
  • 60. jtfwcpnt.jsp This cool script receives one interesting parameter: query Do I need to explain something else? Let's see a very complicated exploit... Vulnerabilities in Oracle Financials - Joxean Koret
  • 61. jtfwcnpt.jsp 0days 3xpl01ts $ export TARGET=”http://<target>:<port>/OA_HTML” $ wget -O - “$TARGET/OA.jsp” "$TARGET/jtfwcpnt.jsp?query=begin%20execute%20immediate%20' grant%20dba%20to%20mom';%20end;” $ wget -O - “$TARGET/OA.jsp” "$TARGET/jtfwcpnt.jsp?query=begin%20execute%20immediate%20' delete%20from%20apps.fnd_user';%20commit;end;” Vulnerabilities in Oracle Financials - Joxean Koret
  • 62. Creating a new SYSADMIN user We're running code as the APPS user so, again, we're the new owner of the data So we can, in example, create a new SYSADMIN like user: Vulnerabilities in Oracle Financials - Joxean Koret
  • 63. Vulnerabilities in Oracle Financials - Joxean Koret
  • 64. Responsibilities Running this PL/SQL code via the jtfwcpnt.jsp script we create a new user and assign 2 responsibilities: 20420 – System Administrator (SYSADMIN) 20872 – System Administration Vulnerabilities in Oracle Financials - Joxean Koret
  • 65. Owning by tiers Abusing from this flaw we gained access to the database backend If we just want to extract some data, we're done, delete the created user and that's all However, if we want to continue owning all the rest of the tiers we need to find a way to execute code also in the middle-tier Remember, we gained access to the database and it will be in a different box :( Vulnerabilities in Oracle Financials - Joxean Koret
  • 66. Gaining Access to the Middle-tiers How can we gain access to the middle-tiers? Checked for a flawed JSP that writes something to disk, but nothing was found Checked also for Runtime.getRuntime() and so on: No luck :( Vulnerabilities in Oracle Financials - Joxean Koret
  • 67. Gaining Access to the Middle-tiers How can we gain access to the middle-tiers? Checked for a flawed JSP that writes something to disk, but nothing was found Checked also for Runtime.getRuntime() and so on: No luck :( But found a funny technique: The Printer From Hell Vulnerabilities in Oracle Financials - Joxean Koret
  • 68. The Printers From Hell Vulnerabilities in Oracle Financials - Joxean Koret
  • 69. The Printer From Hell Oracle Applications Server is a web based application It's designed to be used by big companies either connected from LAN or from Internet They designed a way to print to one system administrator specified printer from anywhere But, how are the printers configured? Administrator does this via the ERP or directly inserting into the database Vulnerabilities in Oracle Financials - Joxean Koret
  • 70. The Printer From Hell Vulnerabilities in Oracle Financials - Joxean Koret
  • 71. The Printer From Hell We have a ”printer coming from hell”, just print something using the ERP or the PL/SQL packages and you're done Vulnerabilities in Oracle Financials - Joxean Koret
  • 72. The Printer From Hell We have a ”printer coming from hell”, just print something using the ERP or the PL/SQL packages and you're done Th3 c0mpl3t3 $y$t3m w4$ 0wN3|) Vulnerabilities in Oracle Financials - Joxean Koret
  • 73. However... We're running code as the ”oracle” OS level user but I know no way to scalate to root :( Well, if the database server is not correctly patched we can always use the ”extjob” suid tool Vulnerability CVE-2008-2613 But, what if the system is a Win32 box? Don't worry! You're already running code as Local System :) Vulnerabilities in Oracle Financials - Joxean Koret
  • 74. Conclussions Vulnerabilities in Oracle Financials - Joxean Koret
  • 75. Oracle Financials R12 It's getting better in some aspects but there are plenty of quite stupid vulnerabilities It's OK (in my opinion) to run it in our companies as an intranet application but you should take care opening connectivity to Oracle Financials from Internet IMHO... Vulnerabilities in Oracle Financials - Joxean Koret
  • 76. Final Conclussion? Vulnerabilities in Oracle Financials - Joxean Koret
  • 77. The End ● Thanks you folks! Vulnerabilities in Oracle Financials - Joxean Koret