Overview
Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore SAP J2EE system vulnerabilities and attack vectors in this conference talk from TROOPERS14. Delve into the intricacies of injecting malicious code, focusing on SDM attacks, authentication bypasses, and file manipulation techniques. Learn about preventive measures and witness a live demonstration of exploits. Gain valuable insights into securing SAP environments against potential threats and enhancing overall system integrity.
Syllabus
Introduction
Presentation
SDM
Attacks
Authentication
Read the file
Log viewer
Prevention
Demonstration
Conclusion
Taught by
WEareTROOPERS