SAP BusinessObjects Attacks

SAP BusinessObjects Attacks

WEareTROOPERS via YouTube Direct link

Encryption

32 of 32

32 of 32

Encryption

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

SAP BusinessObjects Attacks

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Introduction
  2. 2 Agenda
  3. 3 What is SAP BusinessObjects
  4. 4 SAP BusinessObjects Persistence
  5. 5 SAP BusinessObjects Architecture
  6. 6 BusinessObjects Services
  7. 7 BusinessObjects Communication
  8. 8 Corporate
  9. 9 Corporate listeners
  10. 10 Example
  11. 11 Attackers
  12. 12 Ports
  13. 13 Other Ports
  14. 14 Demo
  15. 15 Recommendation
  16. 16 Identify Accounts
  17. 17 Accounts
  18. 18 Security Notes
  19. 19 Version Information
  20. 20 Maninthemiddle Attacks
  21. 21 Initial Reconnaissance
  22. 22 Potential Issues
  23. 23 Options
  24. 24 Information Disclosure
  25. 25 Long Demo
  26. 26 Query Builder
  27. 27 Wireshark
  28. 28 Logon Tokens
  29. 29 PowerShell
  30. 30 File System
  31. 31 Admin Guide
  32. 32 Encryption

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.