← All talks

SAP Security: Compromise Corporate Networks Undetected! #shorts

BSides Frankfurt1:54587 viewsPublished 2026-03Watch on YouTube ↗
About this talk
Discover how attackers exploit SAP GUI misconfigurations to gain undetected access and compromise corporate networks. Learn about the risks and the prevalence of misconfiguration over direct exploits. #SAPSecurity #Cybersecurity #NetworkAttacks #InfoSec #SAP
Show transcript [en]

You can fully compromise the corporate network without even being detected. Um so the SAP killer, you just basically provide the path to the SAP GUI, and then you can specify the connection. And it will automate you a lot of that stuff. So what we do, it looks right now if we are a legitimate user grasping through that SAP system. Which is not worse, but uh SAP GUI is a bit complex to handle, that's why we go that way. So in the background, you see it a bit down there, it's blinking in orange. It runs in the background for us on the SAP GUI. What we can do now, here are some example protocol says just

execute and check if we can execute operating system commands, like who am I? And >> [sighs and gasps] >> yeah, what you guys think? I hope it works. Did it execute anything? I have a demo video that works yes, 2 days ago. Yeah, it's always. Yeah. That didn't help. Uh Let's run it again. There we go. We have the username, which is our service account where the SAP is running on. We could now break for example the operating system again, no EDR usually or AV, so you do not need to be a set up any AV bypass and yeah, you can fully compromise the corporate network without even being detected on a bad day. There are mechanism in place, but the

biggest problem for SAP is not that there is like an exploit. The This is also case especially for Java, but 99% of the attacks against SAP is misconfiguration. Because it's too complex and you can easily mess it up and it sometimes is too annoying to configure it securely.