An Unknown SAP Default Account
Offered By: WEareTROOPERS via YouTube
Course Description
Overview
Explore the hidden dangers of default SAP accounts in this eye-opening 46-minute conference talk. Delve into the creation, location, and potential risks associated with these often-overlooked credentials. Learn about bad practices, their impact on system security, and common exploits. Discover various types of default accounts, including system users, proxy accounts, and reference users. Gain insights into password hashing, application-level loading, and cutting-edge research on the topic. Equip yourself with practical solutions to mitigate risks and enhance your SAP system's security posture.
Syllabus
Introduction
Who are we
Default credentials
What is not known
How do they get created
Where do they get created
Are they in your system
Bad practices
Risk Impact
Exploits
System Users
Proxy
Fighting Script
Password Hash
Third Default Account
Reference User
Application Level Loading
Research
Solutions
Taught by
WEareTROOPERS
Related Courses
The Location AdvantageEsri via Independent Secure Android App Development
University of Southampton via FutureLearn Cloud Computing Security
University System of Maryland via edX Evaluación de peligros y riesgos por fenómenos naturales
Universidad Nacional Autónoma de México via Coursera المدافعون عن حقوق الإنسان
Amnesty International via edX