Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

An Unauthenticated Journey to Root - Pwning Your Company's Enterprise Software Servers

Black Hat via YouTube

Overview

Coursera Spring Sale
40% Off Coursera Plus Annual!
Grab it
Explore a critical cybersecurity presentation from Black Hat that delves into vulnerabilities in SAP's enterprise software. Discover how unauthenticated attackers can potentially gain root access to company servers through the exploitation of the substitution manager and eemTechnical components. Follow the step-by-step attack process, learn about prevention strategies, and understand the far-reaching implications for Fortune 1000 companies relying on SAP's vital business processing systems. Gain valuable insights into securing complex enterprise software environments and mitigating risks associated with widely-used vendor solutions.

Syllabus

Introduction
Agenda
What is the substitution manager
Where to start
What iseem
Technical Analysis
Attack Steps
New Agent
Root Command
Prevention
Conclusion
Questions

Taught by

Black Hat

Reviews

Start your review of An Unauthenticated Journey to Root - Pwning Your Company's Enterprise Software Servers

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.