Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Systems Applications Proxy Pwnage

44CON Information Security Conference via YouTube

Overview

Explore the intricacies of Systems Applications Proxy (SAP) security in this 43-minute conference talk from the 44CON Information Security Conference 2011 Technical Track. Presented by Ian De Villiers of SensePost, delve into SAP conquest data, fundamentals, and compression algorithms. Examine the compression protocol, decompression length, and learn how to use Wireshark for group connections. Investigate recompression techniques, application protocols, message types, and transaction IDs. Analyze input fields, complex messages, and bar structures. Understand the inner workings of SAP systems and explore potential attack vectors through the API. Discover authentication bypass methods, validation techniques, and replay attacks. Witness a live demonstration featuring SAP GUI and learn about the implications for enterprise security. Conclude with a comprehensive summary and insights into the future of SAP security.

Syllabus

Intro
Welcome
Agenda
Why
Disclaimers
History
SAP Conquest Data
Fundamentals
Compression Algorithm
Compression Protocol
Decompression Length
Wireshark
Group Connections
Recompression
Application Protocol
Message Types
Transaction ID
Other Information
Input Fields
Complex Messages
bars
FF structures
How it works
Attack API
Authentication Bypass
Validation
Replay
Demo
SAP GUI
Boss
Summary
Sunset

Taught by

44CON Information Security Conference

Reviews

Start your review of Systems Applications Proxy Pwnage

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.