SAP Security Assessment Methodology Part 3 – Credential Centric Attack Vectors
Before proceeding with this methodology some SAP terminologies are to be understood: Client – A client is a 3-digit number that could be understood as […]
Before proceeding with this methodology some SAP terminologies are to be understood: Client – A client is a 3-digit number that could be understood as […]
You can read Part 1 here. It may be possible that multiple SAP servers could run across different systems. Identify all the servers before […]
SAP is a software suite that offers standard business solutions; it is used by thousands of customers across the globe to manage their businesses to […]
A few months back, I was asked to perform a security assessment of the core banking setup for a bank. The core banking application was […]
[Webinar] Change in Red Team Assessment approach post COVID-19 by Shrikant Antre There are remarkable changes happening in the world due to the current pandemic […]