44CON Information Security Conference
Systems Applications Proxy Pwnage
Explore SAP system vulnerabilities, compression algorithms, and attack techniques. Learn about authentication bypass, validation issues, and practical demonstrations for enhanced security awareness.