Главная
Study mode:
on
1
Introduction
2
Who are we
3
Default credentials
4
What is not known
5
How do they get created
6
Where do they get created
7
Are they in your system
8
Bad practices
9
Risk Impact
10
Exploits
11
System Users
12
Proxy
13
Fighting Script
14
Password Hash
15
Third Default Account
16
Reference User
17
Application Level Loading
18
Research
19
Solutions
Description:
Explore the hidden dangers of default SAP accounts in this eye-opening 46-minute conference talk. Delve into the creation, location, and potential risks associated with these often-overlooked credentials. Learn about bad practices, their impact on system security, and common exploits. Discover various types of default accounts, including system users, proxy accounts, and reference users. Gain insights into password hashing, application-level loading, and cutting-edge research on the topic. Equip yourself with practical solutions to mitigate risks and enhance your SAP system's security posture.

An Unknown SAP Default Account

WEareTROOPERS
Add to list