Skip to main content
SAP Pentest Playbook
Toggle Dark/Light/Auto mode Toggle Dark/Light/Auto mode Toggle Dark/Light/Auto mode Back to homepage

Code Verification

Description

Verify that malicious code has been successfully installed and is functional

Steps

  1. Check Transport Status Description: Confirm transport import completed without errors Input: Transport request number, system access Output: Import status confirmation References: Object: STMS, Object: SE01

  2. Verify Object Existence Description: Check that transported objects exist in target system Input: Object names and types from transport Output: Confirmation of object presence References: Object: SE80, Object: SE11, Object: SE38

  3. Test Object Functionality Description: Execute or activate transported objects to confirm they work Input: Functional test scenarios Output: Confirmation of successful execution References: Object: SE38 execute, Process: transaction calls

  4. Check System Logs Description: Review system logs for any error messages or warnings Input: System access to log viewing transactions Output: Log analysis results References: Object: SM21, Object: ST22, Object: SLG1

  5. Validate Stealth Description: Ensure malicious code is not easily detectable by administrators Input: System monitoring tools and standard checks Output: Stealth assessment confirmation References: Process: Detection Evasion

Outcome

Confirmation that malicious code is successfully installed, functional, and operating covertly within the target SAP system.