An Unauthenticated Journey to Root - Pwning Your Company's Enterprise Software Servers
Offered By: Black Hat via YouTube
Course Description
Overview
Explore a critical cybersecurity presentation from Black Hat that delves into vulnerabilities in SAP's enterprise software. Discover how unauthenticated attackers can potentially gain root access to company servers through the exploitation of the substitution manager and eemTechnical components. Follow the step-by-step attack process, learn about prevention strategies, and understand the far-reaching implications for Fortune 1000 companies relying on SAP's vital business processing systems. Gain valuable insights into securing complex enterprise software environments and mitigating risks associated with widely-used vendor solutions.
Syllabus
Introduction
Agenda
What is the substitution manager
Where to start
What iseem
Technical Analysis
Attack Steps
New Agent
Root Command
Prevention
Conclusion
Questions
Taught by
Black Hat
Related Courses
Computational Investing, Part IGeorgia Institute of Technology via Coursera Инфраструктура рынка, методы и технологии инвестирования
Higher School of Economics via Coursera Maps and the Geospatial Revolution
Pennsylvania State University via FutureLearn Introduction to Investments
Indian Institute of Management Bangalore via Swayam Preparing for the Google Cloud Professional Cloud Architect Exam en Español
Google Cloud via Coursera