Skip to main content
SAP Pentest Playbook
Toggle Dark/Light/Auto mode Toggle Dark/Light/Auto mode Toggle Dark/Light/Auto mode Back to homepage
Edit page

Service discovery & enumeration

Description

Common used Network Ports:

  • 3299/tcp

Options

  • Shodan:
    • port:3299 !HTTP Network packet too big
    • port:3299 product:"SAProuter"
  • Hunter.how:
    • ip.port=="3299"&&protocol=="saprouter"
  • Nmap:
    • nmap -sSVC -n -Pn -p3299 <Target Address(es)/Domain Name>
  • nuclei templates
  • Metasploit Module:
    • auxiliary/scanner/sap/sap_router_info_request
    • auxiliary/scanner/sap/sap_router_portscanner