Главная
Study mode:
on
1
Intro
2
Attacking the Core
3
Attack Vectors
4
How can it be attacked?
5
What is a Business Process?
6
Example: Attacking the Business Processes
7
Determining Victim Bank Accounts
8
Changing the Bank Accounts
9
End of Chapter!
10
Credit Card Processing on SAP
11
Credit Card Data
12
Accessing Cleartext Cardholder information
13
Free Tool? - Sapsucker
14
Decrypting Encrypted Credit Card Numbers
15
External Vendors for Payment Solutions
16
Standard Concept
17
External Payment Card Interface Connectivity
18
Address The Complete Picture
19
Implement a Holistic Process to Stay Secure
20
Automate it
21
The Menu of SAP Security
Description:
Explore SAP vulnerabilities, credit card security, and business process attacks in this Black Hat conference talk. Dive into core attack vectors, learn how to determine and manipulate victim bank accounts, and understand credit card processing in SAP systems. Discover methods for accessing cleartext cardholder information and decrypting encrypted credit card numbers. Examine external vendor payment solutions and their connectivity. Gain insights into implementing holistic security processes and automation to protect SAP environments. Equip yourself with knowledge on SAP security best practices and potential threats in this comprehensive 44-minute presentation.

SAP, Credit Cards, and the Bird That Knows Too Much

Black Hat
Add to list