Главная
Study mode:
on
1
Intro
2
In Memory Computing/IMDB
3
Reasons
4
Market Leaders
5
Main Vendors
6
What is SAP?
7
A blended architecture (contd)
8
Impact of vulnerabilities
9
SAP HANA Concepts
10
SQL Injection on HANA
11
Time travel tables and SQL injection
12
Countermeasures
13
Cross Site Scripting
14
Use Security Features
15
Attacks to the R-Integration
16
Calling C++ functions
17
Conclusions
Description:
Explore blended web and database attacks on real-time, in-memory platforms in this 49-minute conference talk from AppSecUSA 2014. Dive into the unique security challenges posed by platforms like SAP HANA, where databases, web servers, and application code are optimized for performance. Learn about novel attack vectors, including SQL injection exploiting "TIME TRAVEL" features, server-side JavaScript exploits via SQL queries, and potential vulnerabilities in R programming integration. Discover how traditional attack methods may require adaptation in these environments, including the role of social engineering in SQL injection. Gain insights into assessing and securing these platforms through live demonstrations of vulnerabilities, a reference framework for security professionals, and sample applications highlighting common pitfalls for developers.

Blended Web and Database Attacks on Real-time, In-Memory Platforms

OWASP Foundation
Add to list
0:00 / 0:00