
SAP Security Assessment Methodology Part 3 – Credential Centric Attack Vectors
Before proceeding with this methodology some SAP terminologies are to be understood: Client – A client is a 3-digit number […]
Before proceeding with this methodology some SAP terminologies are to be understood: Client – A client is a 3-digit number […]
You can read Part 1 here. It may be possible that multiple SAP servers could run across different systems. […]
SAP is a software suite that offers standard business solutions; it is used by thousands of customers across the globe […]
A few months back, I was asked to perform a security assessment of the core banking setup for a bank. […]
[Webinar] Change in Red Team Assessment approach post COVID-19 by Shrikant Antre There are remarkable changes happening in the world […]