Completed
Enterprise applications: Definitions
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
SSRF vs Business Critical Applications
Automatically move to the next video in the Classroom when playback concludes
- 1 Intro
- 2 2 ERP Scan
- 3 Enterprise applications: Definitions
- 4 Business-critical systems architecture
- 5 Secure corporate network
- 6 Corporate network attack scenario
- 7 SSRF History: Basics
- 8 SSRF history: World research
- 9 Trusted SSRF: Oracle Database
- 10 SSRF Types: SAP
- 11 Remote SSRF: Subtypes
- 12 Simple Remote SSRF: Login bruteforce
- 13 XXE Attacks on other services
- 14 Full Remote SSRF
- 15 Remote SSRF threats
- 16 XXE Tunneling to Verb Tampering
- 17 XXE Tunneling to Buffer Overflow (Hint 2)
- 18 XXE Tunneling to Buffer Overflow: Packet B
- 19 XXE Tunneling to Buffer Overflow (Hint 3)
- 20 XXE Tunneling to Rsh
- 21 Bypass SAP security restrictions
- 22 SAP Gateway server security bypass: Exploit
- 23 SAP Message Server security bypass
- 24 Oracle DB security bypass
- 25 Conclusion?
- 26 Purpose
- 27 How is it working?
- 28 Few steps
- 29 Action: Test
- 30 Action: Scan
- 31 Action: Attack
- 32 DEMO