Главная
Study mode:
on
1
Intro
2
Welcome
3
Agenda
4
Why
5
Disclaimers
6
History
7
SAP Conquest Data
8
Fundamentals
9
Compression Algorithm
10
Compression Protocol
11
Decompression Length
12
Wireshark
13
Group Connections
14
Recompression
15
Application Protocol
16
Message Types
17
Transaction ID
18
Other Information
19
Input Fields
20
Complex Messages
21
bars
22
FF structures
23
How it works
24
Attack API
25
Authentication Bypass
26
Validation
27
Replay
28
Demo
29
SAP GUI
30
Boss
31
Summary
32
Sunset
Description:
Explore the intricacies of Systems Applications Proxy (SAP) security in this 43-minute conference talk from the 44CON Information Security Conference 2011 Technical Track. Presented by Ian De Villiers of SensePost, delve into SAP conquest data, fundamentals, and compression algorithms. Examine the compression protocol, decompression length, and learn how to use Wireshark for group connections. Investigate recompression techniques, application protocols, message types, and transaction IDs. Analyze input fields, complex messages, and bar structures. Understand the inner workings of SAP systems and explore potential attack vectors through the API. Discover authentication bypass methods, validation techniques, and replay attacks. Witness a live demonstration featuring SAP GUI and learn about the implications for enterprise security. Conclude with a comprehensive summary and insights into the future of SAP security.

Systems Applications Proxy Pwnage

44CON Information Security Conference
Add to list