This tool helps you analyze and visualize connections between your SAP systems, enabling identification of potential security risks and vulnerabilities.
For more detailed information about potential threats in SAP systems related to inter-SAP connections, visit this page.
- Input SAP Credentials: Enter system details (SID, username, password, etc.) to establish initial connections.
- Scan for Inter-SAP Connections: Discover and display connections between your SAP systems, including usernames and password storage flags.
- Visualize the Network: View a graph representation of your SAP network, highlighting connections with potential security concerns.
- Filter Connections: Focus on specific connections, such as those with stored passwords.
-
Initiate Connections:
-
View Existing Connections:
-
Explore Inter-SAP Connections:
-
Clone the repository:
git clone https://github.com/redrays-io/SAP-Threat-Modeling-Tool.git
Use code with caution.
-
Install dependencies:
pip install -r requirements.txt
Use code with caution.
-
Run the application:
python app.py
Use code with caution.
-
Access the web interface: Open http://localhost:5000 in your browser.
Alternatively, you can set up the tool using Docker with the following command:
docker pull ghcr.io/redrays-io/sap-threat-modeling:latest
- Credential Storage: This tool stores SAP credentials in a local SQLite database. Ensure proper security measures for the database file.
- Data Sensitivity: The tool exposes information about SAP connections and potential vulnerabilities. Limit access to authorized personnel only.
- Production Use: This tool is intended for development and testing purposes. Evaluate its suitability before using it in production environments.