An Unknown SAP Default Account
Offered By: WEareTROOPERS via YouTube
Course Description
Overview
Explore the hidden dangers of default SAP accounts in this eye-opening 46-minute conference talk. Delve into the creation, location, and potential risks associated with these often-overlooked credentials. Learn about bad practices, their impact on system security, and common exploits. Discover various types of default accounts, including system users, proxy accounts, and reference users. Gain insights into password hashing, application-level loading, and cutting-edge research on the topic. Equip yourself with practical solutions to mitigate risks and enhance your SAP system's security posture.
Syllabus
Introduction
Who are we
Default credentials
What is not known
How do they get created
Where do they get created
Are they in your system
Bad practices
Risk Impact
Exploits
System Users
Proxy
Fighting Script
Password Hash
Third Default Account
Reference User
Application Level Loading
Research
Solutions
Taught by
WEareTROOPERS
Related Courses
Modmob Tools - Home Made Tools to Test Mobile Devices and Monitor NetworksWEareTROOPERS via YouTube Microsoft IT - Secure Journey to IPv6-Only
WEareTROOPERS via YouTube Introducing Faction - A Modern, Powerful, Multiplayer C2 Framework
WEareTROOPERS via YouTube A Diet of Poisoned Fruit - Designing Implants and OT Payloads for ICS Embedded Devices
WEareTROOPERS via YouTube Hardware Side Channel Attacks on the Cheapest
WEareTROOPERS via YouTube