Supporting Programme 2018
IBS Schreiber - LIVE Hacking SAP HANA - What attack scenarios are there?
The really sensitive company data is located in SAP systems. These are secured by the security mechanisms of SAP NetWeaver and the authorization concept. So how to get to the data as a hacker? Especially for attacks from outside, the operating system and database level has always offered itself. SAP HANA is therefore also the focus of hackers. In order to avert such attacks, the methods for hacking the SAP HANA database must be addressed in order to take appropriate safeguards and countermeasures. How UNIX and database systems can be hacked is not insider knowledge of some nerds - the knowledge is freely available on the Internet. Tool collections such as Kali-Linux, BlackArch or PentestBox can be downloaded for free. SAP HANA specifics can now also be found extensively on the Internet. You just have to know where to look...
Incl. live demo and concrete measures for protection.
--- Date: 10.10.2018 Time: 12:15 PM - 12:30 PM Location: Forum T9 - Technology