YoVDO

SAP BusinessObjects Attacks

Offered By: WEareTROOPERS via YouTube

Tags

TROOPERS Courses Cybersecurity Courses Encryption Courses System Architecture Courses Man in The Middle Attacks Courses

Course Description

Overview

Explore SAP BusinessObjects security vulnerabilities and attack vectors in this conference talk from TROOPERS14. Dive into the architecture, persistence mechanisms, and communication protocols of SAP BusinessObjects. Learn about potential security issues, including information disclosure and man-in-the-middle attacks. Witness live demonstrations of exploits using tools like Query Builder, Wireshark, and PowerShell. Gain insights into reconnaissance techniques, account identification, and encryption weaknesses. Discover practical recommendations for securing SAP BusinessObjects deployments and staying up-to-date with security notes and version information.

Syllabus

Introduction
Agenda
What is SAP BusinessObjects
SAP BusinessObjects Persistence
SAP BusinessObjects Architecture
BusinessObjects Services
BusinessObjects Communication
Corporate
Corporate listeners
Example
Attackers
Ports
Other Ports
Demo
Recommendation
Identify Accounts
Accounts
Security Notes
Version Information
Maninthemiddle Attacks
Initial Reconnaissance
Potential Issues
Options
Information Disclosure
Long Demo
Query Builder
Wireshark
Logon Tokens
PowerShell
File System
Admin Guide
Encryption


Taught by

WEareTROOPERS

Related Courses

Network Security
Rochester Institute of Technology via edX
Learn Network Hacking From Scratch (WiFi & Wired)
Udemy
Ethical Hacking With Python, JavaScript and Kali Linux
Udemy
Learn Ethical Hacking: Beginner to Advanced
Udemy
Ethical Hacking mit Python in der Praxis: Der Komplettkurs
Udemy