Injecting Evil Code in Your SAP J2EE Systems
Offered By: WEareTROOPERS via YouTube
Course Description
Overview
Explore SAP J2EE system vulnerabilities and attack vectors in this conference talk from TROOPERS14. Delve into the intricacies of injecting malicious code, focusing on SDM attacks, authentication bypasses, and file manipulation techniques. Learn about preventive measures and witness a live demonstration of exploits. Gain valuable insights into securing SAP environments against potential threats and enhancing overall system integrity.
Syllabus
Introduction
Presentation
SDM
Attacks
Authentication
Read the file
Log viewer
Prevention
Demonstration
Conclusion
Taught by
WEareTROOPERS
Related Courses
Modmob Tools - Home Made Tools to Test Mobile Devices and Monitor NetworksWEareTROOPERS via YouTube Microsoft IT - Secure Journey to IPv6-Only
WEareTROOPERS via YouTube Introducing Faction - A Modern, Powerful, Multiplayer C2 Framework
WEareTROOPERS via YouTube A Diet of Poisoned Fruit - Designing Implants and OT Payloads for ICS Embedded Devices
WEareTROOPERS via YouTube Hardware Side Channel Attacks on the Cheapest
WEareTROOPERS via YouTube