YoVDO

Injecting Evil Code in Your SAP J2EE Systems

Offered By: WEareTROOPERS via YouTube

Tags

TROOPERS Courses Cybersecurity Courses

Course Description

Overview

Explore SAP J2EE system vulnerabilities and attack vectors in this conference talk from TROOPERS14. Delve into the intricacies of injecting malicious code, focusing on SDM attacks, authentication bypasses, and file manipulation techniques. Learn about preventive measures and witness a live demonstration of exploits. Gain valuable insights into securing SAP environments against potential threats and enhancing overall system integrity.

Syllabus

Introduction
Presentation
SDM
Attacks
Authentication
Read the file
Log viewer
Prevention
Demonstration
Conclusion


Taught by

WEareTROOPERS

Related Courses

Modmob Tools - Home Made Tools to Test Mobile Devices and Monitor Networks
WEareTROOPERS via YouTube
Microsoft IT - Secure Journey to IPv6-Only
WEareTROOPERS via YouTube
Introducing Faction - A Modern, Powerful, Multiplayer C2 Framework
WEareTROOPERS via YouTube
A Diet of Poisoned Fruit - Designing Implants and OT Payloads for ICS Embedded Devices
WEareTROOPERS via YouTube
Hardware Side Channel Attacks on the Cheapest
WEareTROOPERS via YouTube