Release and version history

v0.1.16 - 2018-06-19

  • Using Scapy version 2.4.0.
  • Using Sphinx 1.7.4 for documentation.
  • Added missing pysap.utils package in source/binary packages.
  • Use flake8 to find syntax errors and undefined names in Travis ([#20](https://github.com/CoreSecurity/pysap/pull/20)) Thanks [@cclauss](https://github.com/cclauss)!
  • pysap/SAPCAR.py: Improved SAPCAR files parsing, adding proper structure names based on VSI documentation.

v0.1.15 - 2018-03-27

  • Version released at Troopers‘18
  • Added initial support for handling IGS (Internet Graphic Server) packets along with example scripts to play with them ([#19](https://github.com/CoreSecurity/pysap/pull/19)) Thanks [@iggy38](https://github.com/iggy38)!
  • Added initial support for handling PSE and SSO Credential format files.
  • bin/pysapgenpse: New binary tool for working with PSE and SSO credential files.
  • bin/pysapcar: Added options for creating a new archive and appending files to an existing one.
  • pysap/SAPCredv2.py: New module for SSO Credential files definitions and decryption logic.
  • pysap/SAPDiagItems.py, extra/parsesupportbits.py: Corrected order of support data bit fields ([#19](https://github.com/CoreSecurity/pysap/pull/18)). Thanks [@hnzlmnn](https://github.com/hnzlmnn)!
  • pysap/SAPIGS.py: New module for IGS packets layer ([#19](https://github.com/CoreSecurity/pysap/pull/19)).
  • pysap/SAPLPS.py: New module for LPS definitions and INT/DP API decryption logic.
  • pysap/SAPMS.py: Added Message Server Domain field, MS J2EE Cluster/Header/Service packets. Thanks Albert Zedlitz!
  • pysap/SAPPSE.py: New module for PSE files definitions and decryption logic.
  • pysap/utils.py: Moved utils classes into a package.
  • examples/diag_login_brute_force.py: Detect invalid clients while logins ([#17](https://github.com/CoreSecurity/pysap/pull/17)). Thanks [@hnzlmnn](https://github.com/hnzlmnn)!
  • examples/dlmanager_decrypt.py: Replaced use of PyCrypto with Cryptography library.
  • examples/igs_*.py: New example scripts to interact with IGS services ([#19](https://github.com/CoreSecurity/pysap/pull/19)).
  • examples/rfc_monitor.py: Added noop command in the monitor and version command line option.
  • examples/ms_*.py: Added command line option to specify Message Server Domain.
  • extra/pse2john.py: New extra script to extract crypto material in John the Ripper format.

v0.1.14 - 2017-10-04

v0.1.13 - 2017-02-16

  • Documentation now includes graphical representation of the main packets of each protocol.
  • Example scripts now accept route strings without requiring remote host option.
  • pysap/SAPRouter.py: Fixed route request for more than one SAP Router.
  • pysap/SAPEnqueue.py: SAPEnqueueStreamSocket now can connect to an Enqueue server through a SAPRouter.
  • examples/router_niping.py: New example script that implements a very basic version of the niping tool. It works on client or server mode.
  • examples/enqueue_monitor.py: The script now accepts route strings for connecting through a SAPRouter.

v0.1.12.1 - 2016-12-19

  • Minor release.
  • Source build didn’t included header files and thus builds from pip source were failing.

v0.1.12 - 2016-12-16

v0.1.11 - 2016-10-12

v0.1.10 - 2016-03-25

v0.1.9 - 2016-02-08

  • Using Scapy version 2.3.2.
  • Replaced epydoc with Sphinx for documentation.
  • Minor enhancement and code arrangements.
  • pysap/SAPDiagItems.py: Added new support bits from SAP GUI 7.30p9 and 7.40 versions.
  • pysap/utils.py: Removed custom fields now available on Scapy.
  • examples/router_fingerprints.json: Added some fingerprints from SAP Router releases 720.32 and 742.

v0.1.8 - 2015-10-29

  • Enabled travis containers for more quick builds.
  • Minor documentation and README improvements.
  • pysap/SAPRouter.py: Documented some version numbers from old releases ([#3](https://github.com/CoreSecurity/pysap/pull/3)). Thanks [invisiblethreat](https://github.com/invisiblethreat)!
  • pysapcompress/vpa108csulzh.cpp: Improved the fix for CVE-2015-2278 by properly initializing arrays ([#4](https://github.com/CoreSecurity/pysap/pull/4)). Thanks [ret5ret](https://github.com/ret5ret)!
  • examples/diag_render_login_screen.py: Fail gracefully if wx is not found.
  • examples/router_password_check.py: Updating the fau_timer library in use and failing gracefully if it’s not found.
  • examples/router_fingerprint.py: New example script for performing fingerprint over SAP Router versions. This is experimental and the database included only contains a few SAP Router versions, but it might work.

v0.1.7 - 2015-05-13

v0.1.6 - 2015-03-25

  • Requirements now handled by setuptools.
  • Test building with clang on travis.
  • Cleared installation docs.
  • pysap/SAPNI.py: Made clients an instance variable in SAPNIServer.
  • pysap/SAPRouter.py: Added unknown field.
  • examples/diag_dos_exploit.py: Small fix.
  • examples/router_admin.py: Small fix on response handling.
  • examples/router_portfw.py: Added support for specify talk mode when requesting routes.
  • examples/router_scanner.py: Added support for specify talk mode when requesting routes.

v0.1.5 - 2015-01-16

  • Updated to use scapy v2.3.1.
  • Code is more Python3-friendly.
  • Added travis script for running tests.
  • General minor fixes and code improvements.
  • Added test suites for SAPNI, SAPDiag and SAPRouter modules.
  • Added support for routing via SAP Router in almost all example scripts.
  • pysap/SAPDiag.py: Added support for message info and Diag error packets.
  • pysap/SAPDiag.py: Diag item lookup now support looking up multiple items, and string lookups.
  • pysap/SAPDiagClient.py: Added support for specifying support bits when connecting, support for routing via SAP Router.
  • pysap/SAPDiagClient.py: If no terminal is supplied, use a random looking IP by default to avoid identification ([SAP Note 1497445](https://launchpad.support.sap.com/#/notes/1497445)).
  • pysap/SAPDiagItems.py: Fixes on some atom items for old versions.
  • pysap/SAPEnqueue.py: Added trace max file size field.
  • pysap/SAPNI.py: Added helpers for creating new connections.
  • pysap/SAPNI.py: SAPNIProxy implemented using a Worker thread.
  • pysap/SAPNI.py: SAPNIServer implemented using SAPNIStreamSocket.
  • pysap/SAPRouter.py: Added route hop conversion helpers.
  • pysap/SAPRouter.py: Added info client and info server packets.
  • pysap/SAPRouter.py: Added SAPRoutedStreamSocket.
  • pysap/utils.py: Reimplemented MutablePacketField with evaluators.
  • pysapcompress/pysapcompress.cpp: Improved routines and added handling of some error conditions.
  • examples/diag_capturer.py: New example script for dumping Diag login credentials by sniffing or reading a pcap file.
  • examples/enqueue_monitor.py: Added command for get replication info and command for checking trace pattern endless loop vulnerability ([CVE-2014-0995](https://www.coresecurity.com/advisories/sap-netweaver-enqueue-server-trace-pattern-denial-service-vulnerability)).
  • examples/router_admin.py: Parsing of info request responses.
  • examples/router_password_check: New example script for testing if a SAP Router is vulnerable to a timing attack on the password check ([CVE-2014-0984](https://www.coresecurity.com/advisories/sap-router-password-timing-attack)).
  • requirements-optional.txt: Added optional requirements.

v0.1.4 - 2014-03-25

  • Version released at Troopers‘14.
  • Changelog now in GNU format.
  • Changed setup from distutils to setuptools.
  • Added some unit tests.
  • Arranged most of the code according to PEP8.
  • pysap/SAPDiagItems.py: Fixed some support bits and added new ones found in SAP GUI version 7.30.
  • pysap/SAPDiagItems.py: Added new Diag Items: WindowsSize.
  • pysap/SAPEnqueue.py: New packet classes. Crafting of Enqueue Server packets: Connection Admin and Server Admin.
  • pysap/SAPNI.py: Fixed handling of NI_PING keep-alive requests.
  • pysap/SAPNI.py: Added logging namespace sapni for all NI layer activity.
  • pysap/SAPMS.py: New packet classes. Crafting of Message Server packets.
  • pysap/SAPRouter.py: New packet classes. Crafting of SAP Router packets: Route, Admin, Control and Error Information.
  • pysap/SAPSNC.py: New packet class. Container for SNC Frame packets.
  • pysapcompress/pysapcompress.cpp: Splitted exception class in two: CompressError and DecompressError.
  • examples/ms_change_param.py: Added example for retrieving or changing a parameter value using MS Admin set_param commands.
  • examples/ms_dump_info.py: New example script for retrieving information using MS Admin dump commands.
  • examples/ms_impersonator.py: New example script for impersonating an application server connected to a Message Server service instance.
  • examples/ms_listener.py: New example script for connecting to a Message Server and listening for messages coming from the server.
  • examples/ms_messager.py: New example script for sending a message to a connected client through the Message Server.
  • examples/ms_monitor.py: New example script for monitoring the Message Server service (msmon tool on steroids).
  • examples/ms_observer.py: New example script for connecting to a Message Server service and observe clients connecting to it (msprot tool).
  • examples/router_admin.py: New example script for performing administrative tasks on a SAP Route. Includes undocumented commands.
  • examples/router_portfw.py: New example script for routing native connections through SAP Router.
  • examples/router_scanner.py: New example script for scanning internal hosts using SAP Router.

v0.1.3 - 2013-08-28

  • Added general documentation and setup.py command to build it using epydoc.
  • pysap/SAPNI.py: Refactored the SAP Diag Proxy and Server modules to a base NI implementation.
  • pysapcompress/pysapcompress.cpp: Added handling of error return codes.
  • examples/diag_interceptor.py: Refactored to use the new NIProxy implementation. Fixed some hanging issues. Thanks Florian Grunow for the feedback!
  • examples/diag_login_brute_force.py: Handling of license errors.

v0.1.2 - 2012-09-27

  • Version released at Brucon‘12.
  • pysap/SAPNI.py, pysap/SAPDiag.py: Network Interface packet class moved to a new module. Binding of the SAPNI/protocol layer is performed now by each script to allow the use of different protocols with SAPNI.
  • pysap/SAPNI.py: Added a NI Stream Socket class for using it instead of the base Stream Socket.
  • pysap/SAPDiagItems.py: Added new Diag Atom types, as used in NW 7.01 and early versions.
  • examples/diag_rogue_server.py: Minor fixes.
  • examples/diag_render_login_screen.py: Minor fixes.
  • examples/diag_login_brute_force.py: Added multi-thread support.

v0.1.1 - 2012-07-29

  • Initial version released at Defcon 20.