Penetration Testing

Offensive SAP Security

The SAP Penetration Test by SERPENTEQ is a targeted, manually executed attack on your SAP infrastructure — carried out by aggressive security specialists with deep SAP expertise. No automated scan, no generic report: We simulate real attackers and show you exactly how far a targeted attack on your systems goes — and why.

Test variants

  • Black Box - Simulates an external attacker
  • Grey Box - Simulates compromised users
  • White Box - Maximum testing depth

Technical scope

Reconnaissance & Enumeration

  • Active enumeration of all SAP services: message server, dispatcher, ICM, RFC gateway, web dispatcher
  • Identify exposed ICF services and open HTTP endpoints
  • Fingerprinting of SAP releases, patch levels, and installed add-ons
  • OSINT-based preliminary research on exposed SAP assets and credentials

Network & Infrastructure Attacks

  • Exploitation of known SAP CVEs against unpatched systems
  • Message server attacks — Unauthorized registration of application servers, information extraction without authentication
  • RFC Gateway Exploitation — Misconfigured ACLs, external RFC server registration, remote command execution
  • SAP router attacks — router string misuse, information leakage, tunneling via SAProuter
  • SNC/SSL downgrade — Enforcing uncertain communication channels

Authentication & Session Attacks

  • Brute force and credential stuffing against SAP login and web services
  • Password hash extraction — Analysis and offline cracking of BCODE/passcode hashes
  • SSO abuse — Attacks on Kerberos delegation, stolen logon tickets (SAP SSO/SNC)
  • ICM-level session hijacking and unsecure HTTP connections
  • Analysis of standard and technical users with known default credentials

Authorization & Privilege Escalation

  • Systematic use of SOD conflicts for rights escalation
  • Debug & Replace — Manipulating program logic to evade authorization checks
  • Misuse of critical authorization objects: S_DEVELOP, S_TCODE, S_RFC, S_DATASET
  • Cross-client attacks via Trusted RFC connections
  • Privilege escalation from dialog user to SAP_ALL/ basic administrator

ABAP Code Exploitation

  • Manual analysis of exposed RFC-enabled function modules without AUTHORITY CHECK
  • Injection attacks on customer ABAP code: SQL injection (Open SQL/Native SQL), OS command injection via CALL 'SYSTEM'
  • Exploitation of unsafe file operations (OPEN DATASET) for read/write access at operating system level
  • Attacks on insecure BAPIs and OData services (Fiori/UI5)
  • XSS & CSRF in BSP applications and Webdynpro interfaces

Post-Exploitation & Lateral Movement

  • Extraction of sensitive data from tables (credentials, configurations, business data)
  • OS level access about SAP vulnerabilities: remote shell, file system access
  • Pivot into connected systems via RFC trust relationships and interface users
  • Persistence mechanisms at ABAP level: hidden backdoors in function modules and reports

Deliverables

  • Executive Summary — Compact risk assessment for management and CISO, without technical overhead
  • Technical Report — Complete documentation of every vulnerability including CVSS v3.1 score, attack path and proof of concept
  • Attack chain visualization — Graphical presentation of the complete attack path from initial compromise to complete system control
  • Remediation plan — Specific, prioritized remediation measures at code, configuration, and architecture levels
  • Final presentation — Personal discussion of results with your technical team

Find out more

C-Level Awareness

Dive into SAP cybersecurity with us as a C-level manager.

Managed Service

Automated, continuous 360° monitoring of the cybersecurity of entire SAP system landscapes.

360° Risk Analysis

Get a holistic overview of the security level of SAP systems.

From individual SAP applications to complex SAP landscapes — our solutions are scalable, powerful and take your security to the next level.

An overview of our solutions
50+ Companies rely on our expertise
We DO SAP Cybersecurity

Maximize the security of your SAP systems with us.