SAP Dissection Plug-in for Wireshark

SAP Netweaver and SAP HANA are technology platforms for building and integrating SAP business applications. Communication between components uses different network protocols. While some of them are standard and well-known protocols, others are proprietaries and public information is not available.

This Wireshark plugin provides dissection of SAP’s NI, Message Server, Router, Diag, Enqueue, IGS, SNC and HDB protocols. The dissectors are based on information acquired at researching the different protocols and services. Additional experimental support is included for SAP’s RFC protocol. Detailed information about the research can be found in pysap’s documentation.

Features

This plugin counts on several different dissectors:

  • SAP NI Protocol dissector
    • This is the dissector for SAP’s Network Interface (NI) protocol. The dissector handles the reassemble of fragmented TCP packets and identifies keep-alive messages (PING/PONG). It also calls the respective sub-dissector according to the port being used.
  • SAP Router Protocol dissector
    • This dissector includes support for the SAP Router protocol, handling route, control messages and error information packets. The dissector also calls the SNC sub-dissector when SNC frames are found.
  • SAP Diag Protocol dissector
    • The main dissector of the plugin. It dissects the main headers used by the Diag protocol: DP, Diag and Compression headers. The dissector also handles decompression of the payload data and includes dissection of relevant Diag payload items, including Support Bits and common APPL/APPL4 items. Wireshark’s expert information capabilities are used to remark malformed or wrong packets. The dissector also calls the RFC sub-dissector when an embedded RFC call is found and the SNC sub-dissector when SNC frames are found.
  • SAP Message Server Protocol dissector
    • This module dissects the packets used by SAP’s Message Server Protocol in its binary non-HTTP format, for both internal and external ports.
  • SAP Enqueue Protocol dissector
    • This module dissects packets used by SAP’s Standalone Enqueue and Replication Servers.
  • SAP SNC (Secure Network Connection) Protocol dissector
    • This dissector parses SNC frames and their fields. When the frames contains wrapped data that wasn’t encrypted, it allows calling dissectors to get access to the unwrapped data for further dissecting it, as the case of Diag dissector when SNC is used in authentication only or integrity protection quality of protection levels.
  • SAP IGS (Internet Graphic Server) Protocol dissector
    • This dissector parses packets used by SAP’s IGS services.
  • SAP HDB (HANA SQL Command Network) Protocol dissector
    • This dissector parses HANA SQL Command Network Protocol packets. It supports HDB over TLS with the form of a “Decode as” dissector. The main Part Kind formats used during the authentication and initialization of the connections are supported, but others are still missing. Decompression of compressed packets is not yet supported.
  • SAP RFC (Remote Function Call) Protocol dissector (experimental)
    • This dissector perform some basic dissection on the main components of the RFC protocol. It dissects general items and does some basic reassembling and decompression of table contents.

Source code

Setup

  • Installing: Installation instructions for several different operative systems are included and detailed in the project’s README file.

License

This Wireshark plugin is distributed under the GPLv2 license. Check the COPYING file for more details.

Contact

Whether you want to report a bug or give some suggestions on this package, drop us a few lines at oss@secureauth.com or contact the author email mgallo@secureauth.com

Pin It on Pinterest