Главная
Study mode:
on
1
Introduction
2
Agenda
3
What is the substitution manager
4
Where to start
5
What iseem
6
Technical Analysis
7
Attack Steps
8
New Agent
9
Root Command
10
Prevention
11
Conclusion
12
Questions
Description:
Explore a critical cybersecurity presentation from Black Hat that delves into vulnerabilities in SAP's enterprise software. Discover how unauthenticated attackers can potentially gain root access to company servers through the exploitation of the substitution manager and eemTechnical components. Follow the step-by-step attack process, learn about prevention strategies, and understand the far-reaching implications for Fortune 1000 companies relying on SAP's vital business processing systems. Gain valuable insights into securing complex enterprise software environments and mitigating risks associated with widely-used vendor solutions.

An Unauthenticated Journey to Root - Pwning Your Company's Enterprise Software Servers

Black Hat
Add to list
0:00 / 0:00