Главная
Study mode:
on
1
Introduction
2
Agenda
3
What is SAP BusinessObjects
4
SAP BusinessObjects Persistence
5
SAP BusinessObjects Architecture
6
BusinessObjects Services
7
BusinessObjects Communication
8
Corporate
9
Corporate listeners
10
Example
11
Attackers
12
Ports
13
Other Ports
14
Demo
15
Recommendation
16
Identify Accounts
17
Accounts
18
Security Notes
19
Version Information
20
Maninthemiddle Attacks
21
Initial Reconnaissance
22
Potential Issues
23
Options
24
Information Disclosure
25
Long Demo
26
Query Builder
27
Wireshark
28
Logon Tokens
29
PowerShell
30
File System
31
Admin Guide
32
Encryption
Description:
Explore SAP BusinessObjects security vulnerabilities and attack vectors in this conference talk from TROOPERS14. Dive into the architecture, persistence mechanisms, and communication protocols of SAP BusinessObjects. Learn about potential security issues, including information disclosure and man-in-the-middle attacks. Witness live demonstrations of exploits using tools like Query Builder, Wireshark, and PowerShell. Gain insights into reconnaissance techniques, account identification, and encryption weaknesses. Discover practical recommendations for securing SAP BusinessObjects deployments and staying up-to-date with security notes and version information.

SAP BusinessObjects Attacks

WEareTROOPERS
Add to list