SlideShare a Scribd company logo
Ertunga Arsal
Chaos Communication Congress 2010
Rootkits and Trojans on your SAP Landscape
1
Agenda
• Introduc.on	to	Enterprise	Security	
• SAP*	Applica.ons	in	General	
• BASIS	(SAP	infrastructure)	Security	
• A>acks	to	ABAP	Programs	
• ABAP	Rootkits	
• The	Threat	Agents	
• How	To	Stay	Secure	
*SAP	refers	to	SAP	R/3	and	Netweaver	applica.ons	throughout	this	presenta.on,	not	the	company.	
2
About	Me	 	
• Ertunga	Arsal	<e.arsal	@	esnc.de>	
–Security	Researcher	with	focus	on	Enterprise	Systems	
–Founder	of	ESNC	GmbH,	a	company	specialized	in	SAP	Security	
• Officially	acknowledged	for	the	following	Security	Patches	:	
• SAP	Note	1484692	-	Protect	read	access	to	password	hash	tables		
• SAP	Note	1497104	-	Protect	access	to	PSE		
• SAP	Note	1421005	-	Secure	configura.on	of	the	message	server	
• SAP	Note	1483525	-	New	security	center	in	SAP	GUI	7.20	
• SAP	Note	1485029	-	Protect	read	access	to	key	tables		
• SAP	Note	1488406	-	Handling	the	generated	user	TMSADM	
• SAP	Note	1511107	-	Execu.ng	freely	determined	code	using	transac.on	SE37	
• SAP	Note	1510704	-	Missing	Authoriza.on	Check	in	AFX	Workbench	report
3
Typical	Enterprise
• Has	more	than	a	thousand	of	employees	
• Is	a	circus	of	IT	Systems	
–Mixture	of	opera.ng	systems,	databases,	applica.ons	
• And	their	different	versions	
• Usually	implemented	by	different	teams	
• Spanning	to	a	lot	of	years	
• Decision	makers	care	more	about	their	bonus	than	
the	interest	of	the	company	
4
Typical	Enterprise	Security
• Even	medium	level	of	IT	security	is	too	expensive	to	achieve		
–Missing	asset	management	(how	many	Oracle	DBs,	Windows	servers,	etc?)	
–Tons	of	security	scanning,	to	few	remedia.on	chasing	
–Many	of	the	vulnerabili.es	cannot	be	mi.gated	
• Obsessed	by	Cross	Site	Scrip.ng	
• IT	security	departments	cannot	influence	security	decisions	of	
business	applica.ons	much,	because	of	poli.cal	reasons		
• Nobody	cares	about	the	hacked	UNIX	machine,	SQL	DB,	or	
others	
–If	they	are	not	directly	held	responsible	(CYAS	-	Cover	Your	Ass	Security)	
• SoX,	PCI-DSS,	legal	requirements,	...	
• Defacements	and	similar	security	incidents	are	budget	approvers
5
SAP	Systems
• Business	specific	
– HR,	Finances,	Logis.cs…	
• Industry	solu.ons	
– Defense	&	Aerospace,	Oil	&	Gas,	Banking,	
Chemicals...	
• Hold	the	Crown	Jewels	
– Hence	“Business”	
• Are	usually	extensively	customized	
– SAP	consultants	on-site	
– Long	running	implementa.on	projects	
• Less	exposure	to	typical	hackers	
– Who	would	learn	ABAP	for	hacking?		
– How	would	someone	try	it	at	home?	
6
Su>on’s	Law
• Main	principle:	“When	diagnosing,	one	should	first	
consider	the	obvious”	
• Named	auer	a	bank	robber,	Willie	Su>on	
–Su>on	was	asked	why	he	robbed	the	banks	
–His	response*:	“Because	that’s	where	the	money	is”	
• Probably	he	never	said	this
7
SAP	Security
• Security	mostly	focuses	on	authoriza.ons	and	segrega.on	of	du.es	
–SOD’s	main	focus	is	the	ac.ons	of	a	single	person	
–Two	guys	get	together	=	throw	away	your	SOD	investments	
–Weak	passwords	(99%	of	the	case)	=	throw	away	your	SOD	investments		
• Intrusion	preven.on	is	s.ll	a	baby	
–How	many	signatures	does	your	expensive	IDP	have	for	business	apps?	
• Risks	are	underes.mated/general	IT	Security	efforts	are	typically	
unbalanced	at	companies	
–How	many	Global	500s	are	running	SAP	for	the	core	business?	
–How	many	people	from	their	IT	Security	teams	have	SAP	security	skills?	
• Unlike	e.g	Ac.ve	Directory,	SAP	systems	belong	to	the	business,	not	the	IT	
• 	Security	departments	usually	fail	when	they	are	challenged	
–Either	missing	skills	or	“This	a'ack	is	too	sophis-cated,	nobody	can	do	it”	response	
8
SAP:	Simplied	Connec.on	Overview
9
• DIAG	Protocol:	GUI	users		
–TCP	3200-3299	
• RFC	Protocol:	Service	users		
–TCP	3300-3399	
• RFC	Protocol	over	SOAP:	Service	Users	
–TCP	8000-8099	(Usually)
SAP	Load	Balancer
• “Message	Server”	
• If	not	properly	configured,	
an	a>acker	can	register	its	
own	servers	[top	pic	-	PoC]	
• Can	fake	the	clients,	MITM	
or	more	
– Implement	ms/acl_info	access	
control	to	protect	it!
10
SAP	Applica.on	Server
• Real	name	the	“Gateway”	
• Built-in	remote	shell	func.onality	via	RFC	
–Good	for	remote	administra.on	without	authen.ca.on	
–Supports	all	opera.ng	systems	(AIX,	HP-UX,	Z/OS,	Win...)	
–Can	be	restricted	via	secinfo	ACL	configura.on		
–Mariano	men.oned	this	at	BH	in	2007	
• Secinfo/reginfo	can	be	bypassed	with	ease	
–Make	sure	you	apply	the	latest	kernel	security	patches	and	
you	have	a	restric.ve	secinfo/reginfo	congura.on!
11
DEMO:	Remote	Shell
12
IP: 5.5.5.7
we attack here
our application
talks RFC
“GUI	users	are	the	most	powerful	users”	myth	
and	RFC
• RFC	(Remote	Func.on	Call)	protocol	lets	you	run	func.ons	remotely	
–To	run;	use	Java,	C,	etc.	with	RFC-SDK	or	simply	execute	the	test	program	startrfc.	
Following	creates	a	new	user	with	god	rights:	
startrfc -3 -h 10.1.5.4 -s 05 -c 010 -u ERTUNGA -p CCC42 -F SUSR_RFC_USER_INTERFACE
-E USER=SATRIANI -E ACTIVITY=01 -E PASSWORD=RUBINA -E USER_TYPE=A -T USER_PROFILES,
12,r=-<press ENTER>SAP_ALL<press enter> <press ctrl-z and enter>
• There	is	no	exploit	involved.	Everything	is	intended	func.onality.	
–Beats	“RFC	users	are	not	a	threat	because	they	cannot	login	via	SAPGUI”	
–Time	to	recheck	company’s	shared	folders	and	eliminate	hardcoded	passwords.	
• RFC	(a.k.a	communica.on)	users	are	thus	very	very	important!	
–Secure	their	passwords	and	make	them	part	of	the	password	change	process	
–Don’t	forget:	GUI	(dialog)	users	which	have	S_RFC	rights	can	also	execute	remotely	
–SAP_ALL	FOR	COMMUNICATION	USERS	IS	A	NO	GO!
13
A	Few	RFC’s	to	note	down	and	protect:		
(Proper	user	authoriza.ons	is	the	key)
• RFC_READ_TABLE	
–Reads	the	contents	of	any	table	(Including	ones	with	sensi.ve	data	e.g	salary	informa.on)	
–	Has	bugs	in	conver.ng	e.g	binary	fields	
• 	1	Byte	=	2	Hex,	so	20	byte	hash	->	40	hex	chars	
• 	Only	returns	first	20	chars	because	of	miscalcula.on	->	only	first	half	of	the	password	hashes	
• SUSR_RFC_USER_INTERFACE	
–can	be	used	for	crea.ng/modifying	users.			
• RFC_ABAP_INSTALL_AND_RUN	
–	Takes	ABAP	source	lines	and	executes	them	
• does	not	execute	on	produc.on	systems	but	non-produc.on	does	not	mean	that	system	is	unimportant!	
–	Widely	known!!!	.ghten	user	authoriza.ons	to	prevent	abuse	
–	More	restricted	in	latest	NetWeaver	Systems	
• SAP_ALL	RFC	users	don’t	have	those	restric.ons!!!	
• !!!	RFC	can	be	encapsulated	in	SOAP	messages	(SOAP	RFC)	
–Company’s	internal	proxy	suddenly	opens	the	doors	to	all	SAP	systems	
–Disable	it	if	not	used!
14
Single	Sign-on	(SSO2)
• Is	a	convenience	feature,	not	a	security	feature	
• RTFM:	Secure	Store	and	Forward	[SSF]	documenta.on		
• Personal	Security	Environment	files	hold	the	private	key	data	
–Stored	per	default	in	SAPSYS.pse	file	or	DB	table	SSF_PSE_D	
• If	an	a>acker	obtains	it,	it	can	create	authen.ca.on	.ckets	
for	the	vic.m	system	
–Accep.ng	these	.ckets	is	enabled	per	default	
–A>acker	can	logon	as	any	user	
• The	idea	of	home	brewed	authen.ca.on	.ckets	first	came	
from	an	SAP	guru:	Ralf	Nellessen
15
DEMO:	Cer.cate	A>acks
16
Single	Sign-on	(SSO2)
• The	private	key	container	(PSE)	
can	be	pin-protected	
• I	was	trying	to	see	whether		
the	pin	mechanism	had	any	
flaws	
–Found	a	way,	so	googled	for	more	
info	
–Somebody	was	unconsciously	
ahead	and	even	documented	
that	:)	
• Disable	accep.ng	.ckets	using	
relevant	prole	parameters!
17
Conguring	Secure	Network	Communica.ons	for	SAP		
(h>p://dlc.sun.com/pdf/820-5064/820-5064.pdf)
SAP	Applica.ons	(ABAP)
• ABAP	code	holds	almost	all	of	the	business	logic	
• More	than	2.000.000	programs	are	present	at	an	
SAP	ECC	6.0	system	auer	installa.on.		
–Some	programs	have	more	than	50.000	lines	of	source	code	
• ABAP	Language	is	very	powerful	and	easy	to	learn		
–High	level	and	easy	to	read	applica.ons		
–Low	level	func.onality	is	proxied	to	the	kernel	executables	when	
required.	e.g	for	encryp.on.		
• ABAP	stack	can	“call”	the	kernel.		
• We’ll	only	focus	on	the	na.ve	ABAP	code	for	this	presenta.on.	
18
Dynamic	ABAP
• Statement:	GENERATE	SUBROUTINE	POOL	
–Dynamically	generates	ABAP	code.	
–If	the	code	is	generated	via	user	specified	input,	mistakes	mean:	
• ABAP	Injec.on	
• Game	over	
–An	example	is	the	TMS_CI_START_SERVICE	vulnerability
19
TMS_CI_START_SERVICE		
Executable	Func.on
• Transport	Management	System	required	this	
–	Transport	==	Souware	Installa.on	
• It	is	an	RFC	
–	Remotely	Executable	Func.on	Call		
• Takes	an	input	table	as	source	code	and	if	the	
parameters	are	specied	properly,	executes	the	
contents	of	it.		
–	Bingo!
20
TMS_CI_START_SERVICE		
Executable	Func.on
• Here	is	a	simple	representa.on	of	the	vulnerable	part	of	
it:	
Generate	subroutine	pool	pp_table	name	ix_context.		
perform	(ix_command)	in	program	(ix_context)	tables	pp_table.		
• SAP	patched	it	via:	
–SAP	Note	1298160:	Forbidden	program	execu.on	possible	
• TMSADM	default	password	is	at	least	for	the	last	5	
years	public	
–Password	is	“PASSWORD”	
21
DEMO:	ABAP	Injec.on
22
SQL	Injec.on
• ABAP	typically	uses	parametrized	queries.	
– Developers	can	s.ll	specify	parts	of	sql	statements	dynamically	by	
parentheses	
• Not	dynamic:		
–SELECT ColumnA FROM TableA INTO[...]
• Dynamic:		
–SELECT(var_ColumName)FROM(var_TableName)I
NTO[...]WHERE(var_WhereClause)		
• Avoid	dynamic	statements	where	possible!
23
SQL	Injec.on
• It’s	not	a	bug,	its	a	feature	in	concept	“Run	Time	
Type	Crea.on”		
–(e.g	Z_RTTC	report	in	NSP	Test	system)	
–h>ps://wiki.sdn.sap.com/wiki/display/Snippets/
Concept+of+Run+Time+Type+Crea.on	
• 	Means	generic	table	access	-	if	not	done	properly	
• !!!	Also	check	the	“EXEC	SQL”	
–It	allows	DB	specific	dynamic	queries	
24
Cross	Site	Scrip.ng
• Hard	to	believe	we	are	s.ll	talking	about	it	in	2011	
• Proper	sani.za.on/encoding	of	the	input	data	is	the	key	for	
self	developed	web	code	such	as	BSPs.	
• If	not	done,	an	a>acker	can	do	everything	related	to	XSS,	plus	
steal	e.g	the	SSO2	(Authen.ca.on)	cookies	from	the	clients	
–SSO2	cookies	are	stateless	so	client	impersona.on	is	a	breeze.		
• Avoid	using	this	mechanism	without	proper	controls	
–If	you	have	F5’s	or	similar	devices,	encrypt	cookies	based	on	origin	ip	
• can	kill	business	if	you	encrypt	based	on	full	ip	(32	bits)	
• can	be	too	open	if	you	just	encrypt	/24	of	that	ip	
• What	happens	to	NAT	clients,	Firesheep?	
25
ABAP	Executable	Manipula.on
• Statement:	INSERT	REPORT	
• Writes	custom	code	to	any	ABAP	program		
• It’s	even	possible	to	call	an	editor	to	make	it	more	
user	friendly	
–Called	editor	is	similar	to	the	ABAP	development	environment		
• Very	suspicious	if	found	in	self	developed	code
26
RS_REPAIR_SOURCE	
Executable	Program
• Unpatched	version	does	not	have	authoriza.on	
checking.	
• People	with	e.g	SE38	rights	can	execute	this	and	
manipulate	the	system	and	data	of	it.	
• Same	as	ABAP	injec.on,	only	more	convenient.	
• SAP	patched	it	via:	
– SAP	Note	1167258:	Program	RS_REPAIR_SOURCE	
• There	are	many	other	cri.cal	ABAP	statements	but	they	
are	beyond	our	scope	for	today.	[one	hour	.me	limit	hit]
27
ABAP	Rootkits	
• So,	it	is	possible	to	modify	system	executables	(ABAPs)	
• An	a>acker	can	easily	infect	important	ones	executables	and	
install	an	ABAP	rootkit	
• SAP	has	RFC	func.ons	that	do	not	require	user	authen.ca.on	
by	default	(SRFC	Func.on	Group).	This	could	be	one	candidate.	
• Installed	rootkit	can	give	anonymous	access	to	the	a>acker	
with	func.onality	such	as:	
– Installing	SAP_ALL	users	
– Manipula.ng	ABAP	reports	
– Running	OS	commands	
– Stealing	hashes	or	PSE	files		
– Dele.ng	Logs
28
The	Front	End:	SAPGUI
• Main	applica.on	for	SAP	systems	
• Runs	on	different	pla•orms	
• Has	powerful	features	
• Has	an	API	for	client	ac.ons	
– Downloading	
– Uploading	
– Execute	
– Registry	Access	
– etc.	
• With	SAPGUI	7.20,	there	is	a	“Security	Center”	where	
certain	ac.ons	can	be		blocked	with	an	ACL
29
DEMO:	Execu.ng	code	on	the	client
3012
our application
talks RFC
1 we attack here2
4Code is executed at victims machine
After next connect
Logon Code gets manipulated
3
Triple-Penetra.on	A>acks
• Penetra-on	1:	A>acker	exploits	the	weakest	system	
–Typical	enterprise	setup	:		
• Tes.ng/Development	->	Quality	Assurance	->	Produc.on	
–Among	them,	most	unprotected	are	test/development	
systems	
• Who	connect	to	these	systems?	Usually,	admins	and	developers	
–TAGS:	Password	Security,	Protec.on	of	the	PSE	files,	
Message	Server	Security,	Database	Security,	OS	Security,	
Network	Sning,	Missing	Patches	etc...
31
Triple-Penetra.on	A>acks
• Penetra-on	2:	A>acker	infects	clients	which	
connect	to	the	weakest	system	
–Starts	with	modifica.on/infec.on	of	the	cri.cal	areas	such	
as	logon	screen	ABAP	code	
–When	admins/developers	successfully	login,	malicious	
payload	is	downloaded	and	executed	on	these	users’	
computers	
• An.virus	bypass,	user	mode	rootkits,	etc.	
• Sniffing	SAP	creden.als	e.g	by	tampering	saplogon.ini
32
Triple-Penetra.on	A>acks
• Penetra-on	3:	Vic.m	infects	all	the	systems	it	later	
connects	to	
–Modifica.on	of	cri.cal	components	of	the	newly	accessed	
SAP	systems	
• Internal	produc.on	systems	
• Partner	systems	or	other	cri.cal	systems
33
0wn	Half	the	W0rld’s	T0p	Businesses
• Especially	when	ini.al	target	is	an	SAP	Hos.ng	or	Training	
provider	
– A>acker	pays	a	small	amount	to	get	a	test	account	
– Infects	the	system	
– Sits	down	and	waits	for	the	admin	or	other	users	to	spread	the	infec.on	to	
the	systems	they	connect	to	
• Configure	your	SAPGUI	security	se‚ngs	and	avoid	shared	
SAP	systems	where	possible!	
• Protect	your	end	users	via	proper	endpoint	protec.on!
34
The	Robin	Hood	W0rm	for	Fun	and	Prot
• Worm	can	access	to	the	financial	applica.ons	and	data!	
–Sort	of	the	“Worm	writer’s	wet	dream”	
• Checks	the	balance	at	the	year	end	closing	
• If	the	company	has	profit:	
–Donates	%0.01	of	that	amount	to	Red	Cross,	Red	Crescent	[put	your	
favorite	red	organiza.on	here],	SaveTheChildren	or	Wikileaks	
• If	infected	systems	contain	HR	systems:	
–Worm	publishes	salary	informa-on	of	the	employees	online	
• Tens	of	thousands	of	people	no.ce	that	the	jerk	from	department	X	
gets	twice	as	much	money	
• Also	consider	the	legal	implica.ons	on	the	businesses
35
The	Threat	Agent:	ABAP	Developer
• Writes	code	that	runs	at	the	heart	of	the	system	
• The	user	rights	and	permissions	don’t	apply	to	him	
• He	can	assign	god	rights	to	itself	via	code	
–Audit	logs	are	typically	disabled	on	development	systems	
• If	enabled,	most	probably	developers	will	be	able	to	disable/tamper	them	
• remember	to	always	log	to	an	external	system.		
• You	need	to	trust	the	developers	more	than	your	security	
team	
–Would	you	hire	an	ABAP	developer	who	recently	worked	at	a	compe.tor?	
• IF	answer	EQUALS	”HELL,	YEAH”,	think	again	now.	
–How	about	the	contracted	ones	that	also	provide	services	to	other	
companies	at	the	same	.me?
36
The	Threat	Agent:	Dark	Organisa.ons
• STUXNET	is	very	popular	but…	
–SAP	souware	is	used	for	produc.on	of	fighter	jets,	running	power	grids,	
oil	&	gas,	cri.cal	produc.on	systems	and	more.	Especially	produc.on,	
materials	management,	logis.cs	and	financials	applica.ons…	
• h>p://www.sap.com/industries/	
–Has	much	be>er	API	and	documenta.on	than	PLCs	and	Step7	
• Compared	to	the	effort	spent	for	STUXNET,	it	would	be	
unreasonable	to	think	that	similar	is	not	already	done	for	
such	systems	
–What	happens	when	you	order	wrong	materials	for	the	next	Eurofighter	
aircrau?	
–How	would	you	detect	it?			
37
How	to	stay	secure?		
(some	more	.ps)
• Proper	systems	architecture	is	a	prerequisite.		
–Read	and	Apply	the	“SECURE	CONFIGURATION	SAP	NETWEAVER	-	APPLICATION	
SERVER	ABAP”	document	from	SAP		
• Make	sure	relevant	people	in	your	company	also	read	it!	
• Check:	h>ps://service.sap.com/~sapidb/011000358700000968282010E.pdf		
• Implement	secinfo/reginfo	and	ms_aclinfo	ACLs	before	system	
is	rst	online	
• Analyze	your	systems	or	use	an	ABAP	integrity	checking	tool	for	
detec.ng	malicious	system	tampering	and	rootkit	infec.ons.	
–Currently	only	two	products	known	to	me.	From	Onapsis	and	ESNC	GmbH	
• Never	give	the	development	systems	write	permissions	to	the	
produc.on	systems’	transport	import	folders
38
How	to	stay	secure?	
• Have	proper	“check-in”	and	“leavers	process”	that	take	the	
ABAP	developer	risks	into	considera.on	
–e.g.	Full	user	password	resets	on	certain	development	systems	or	other	
precau.ons	when	a	developer	leaves	the	company	
–Also	consider	pu‚ng	external	consultants	in	the	scope		
• Audit	the	code	against	security	vulnerabili.es	before	
transpor.ng	to	produc.on	systems	
–Currently	only	2	automa.on	products	known	to	me.	From	ESNC	GmbH	and	
from	VirtualForge	GmbH	
• Syncing	passwords	to	development	systems	means,	
possibility	of	developers	to	capture	valid	passwords	for	
produc.on	systems.	Avoid	it!
39
How	to	stay	secure?	
• Get	rid	of	insecure	and/or	default	passwords	
• Disable	backwards	compa.bility	of	passwords	
• Follow	vendor’s	security	notes	and	guidelines	
–h>ps://service.sap.com/securitynotes	
• Convince	the	upper	management	that	staying	2	
years	behind	the	security	patches	is	a	bad	idea!	
• Install	the	latest	security	patches	
• Install	the	latest	security	patches	
• Install	the	latest	security	patches
40
Credits/Thanks
• Stefan	Fuenfrocken	from	EUROSEC	
• Ralf	Nellessen	from	TRUSTWERK	
• Chris.an	Wippermann	from	SAP	
• Everyone	@	Product	Security	Response	Team/SAP	
41
Ques.ons?	
Ertunga	Arsal	
ertunga	at_sabanciuniv.edu
42
This	publica.on	contains	references	to	products	of	SAP	AG.	SAP,	ABAP,	SAPGUI	and	other	named	SAP	products	and	associated	logos	
are	brand	names	or	registered	trademarks	of	SAP	AG	in	Germany	and	other	countries	in	the	world.	SAP	AG	is	neither	the	author	nor	
the	publisher	of	this	publica.on	and	is	not	responsible	for	its	content.	
This	presenta.on	and	the	accompanying	paper	is	for	educa.onal	purposes	only,	I	will	not	be	held	responsible	for	what	you	do	with	
this	informa.on,	you	use	it	at	your	own	risk.
Some	Tools	For	Protec.ng	Your	SAP	Systems
• SAP	Vulnerability	Scan	and	Penetra.on	Tes.ng:	
–ESNC	Security	Suite	
–h>ps://www.esnc.de/esnc-sap-security-audit-souware/esnc-
security-suite-sap-security-scanner/index.html		
• SAP	SIEM	Integra.on	and	Real-.me	A>ack	
Detec.on:	
–Enterprise	Threat	Monitor	
–h>ps://www.enterprise-threat-monitor.com	
43

More Related Content

What's hot

Change, Release, Management In-Depth vTom.pptx
Change, Release, Management In-Depth vTom.pptxChange, Release, Management In-Depth vTom.pptx
Change, Release, Management In-Depth vTom.pptx
AdilPatel34
 
Chrome拡張機能の脆弱性を探そう!
Chrome拡張機能の脆弱性を探そう!Chrome拡張機能の脆弱性を探そう!
Chrome拡張機能の脆弱性を探そう!
KageShiron
 
SOC: Use cases and are we asking the right questions?
SOC: Use cases and are we asking the right questions?SOC: Use cases and are we asking the right questions?
SOC: Use cases and are we asking the right questions?
Jonathan Sinclair
 
SAP SuccessFactors Recruiting
 SAP SuccessFactors Recruiting SAP SuccessFactors Recruiting
SAP SuccessFactors Recruiting
Juan Andres Peiro
 
見終わったらすぐできる! VMware & Nutanix ユーザーのためのTerraform Cloud
見終わったらすぐできる! VMware & Nutanix ユーザーのためのTerraform Cloud見終わったらすぐできる! VMware & Nutanix ユーザーのためのTerraform Cloud
見終わったらすぐできる! VMware & Nutanix ユーザーのためのTerraform Cloud
Wataru Unno
 
Identity and Access Management Introduction
Identity and Access Management IntroductionIdentity and Access Management Introduction
Identity and Access Management Introduction
Aidy Tificate
 
Security operations center 5 security controls
 Security operations center 5 security controls Security operations center 5 security controls
Security operations center 5 security controls
AlienVault
 
NF101: Nutanix 101
NF101: Nutanix 101NF101: Nutanix 101
NF101: Nutanix 101
NEXTtour
 
Citrix XenDesktop and XenApp 7.5 Architecture Deployment
Citrix XenDesktop and XenApp 7.5 Architecture DeploymentCitrix XenDesktop and XenApp 7.5 Architecture Deployment
Citrix XenDesktop and XenApp 7.5 Architecture Deployment
Huy Pham
 
Enterprise single sign on
Enterprise single sign onEnterprise single sign on
Enterprise single sign on
Archit Sharma
 
Cyberark training pdf
Cyberark training pdfCyberark training pdf
Cyberark training pdf
Akhil Kumar
 
Performance Monitoring and Testing in the Salesforce Cloud
Performance Monitoring and Testing in the Salesforce CloudPerformance Monitoring and Testing in the Salesforce Cloud
Performance Monitoring and Testing in the Salesforce Cloud
Salesforce Developers
 
VMware HCI solutions - 2020-01-16
VMware HCI solutions - 2020-01-16VMware HCI solutions - 2020-01-16
VMware HCI solutions - 2020-01-16
David Pasek
 
SOC presentation- Building a Security Operations Center
SOC presentation- Building a Security Operations CenterSOC presentation- Building a Security Operations Center
SOC presentation- Building a Security Operations Center
Michael Nickle
 
Implementing an Application Security Pipeline in Jenkins
Implementing an Application Security Pipeline in JenkinsImplementing an Application Security Pipeline in Jenkins
Implementing an Application Security Pipeline in Jenkins
Suman Sourav
 
CCNA Security 02- fundamentals of network security
CCNA Security 02-  fundamentals of network securityCCNA Security 02-  fundamentals of network security
CCNA Security 02- fundamentals of network security
Ahmed Habib
 
SAP Single Sign-On 2.0 Overview
SAP Single Sign-On 2.0 OverviewSAP Single Sign-On 2.0 Overview
SAP Single Sign-On 2.0 Overview
SAP Technology
 
Salesforce開発で気を付けたいポイント
Salesforce開発で気を付けたいポイントSalesforce開発で気を付けたいポイント
Salesforce開発で気を付けたいポイント
y-maeda
 
Balbix-New-CISO-Board-Deck.pptx
Balbix-New-CISO-Board-Deck.pptxBalbix-New-CISO-Board-Deck.pptx
Balbix-New-CISO-Board-Deck.pptx
jjvdneut
 
クラウド & STAR-CCM+ を活用するための勘ドコロ
クラウド & STAR-CCM+ を活用するための勘ドコロクラウド & STAR-CCM+ を活用するための勘ドコロ
クラウド & STAR-CCM+ を活用するための勘ドコロ
Rescale Japan株式会社
 

What's hot (20)

Change, Release, Management In-Depth vTom.pptx
Change, Release, Management In-Depth vTom.pptxChange, Release, Management In-Depth vTom.pptx
Change, Release, Management In-Depth vTom.pptx
 
Chrome拡張機能の脆弱性を探そう!
Chrome拡張機能の脆弱性を探そう!Chrome拡張機能の脆弱性を探そう!
Chrome拡張機能の脆弱性を探そう!
 
SOC: Use cases and are we asking the right questions?
SOC: Use cases and are we asking the right questions?SOC: Use cases and are we asking the right questions?
SOC: Use cases and are we asking the right questions?
 
SAP SuccessFactors Recruiting
 SAP SuccessFactors Recruiting SAP SuccessFactors Recruiting
SAP SuccessFactors Recruiting
 
見終わったらすぐできる! VMware & Nutanix ユーザーのためのTerraform Cloud
見終わったらすぐできる! VMware & Nutanix ユーザーのためのTerraform Cloud見終わったらすぐできる! VMware & Nutanix ユーザーのためのTerraform Cloud
見終わったらすぐできる! VMware & Nutanix ユーザーのためのTerraform Cloud
 
Identity and Access Management Introduction
Identity and Access Management IntroductionIdentity and Access Management Introduction
Identity and Access Management Introduction
 
Security operations center 5 security controls
 Security operations center 5 security controls Security operations center 5 security controls
Security operations center 5 security controls
 
NF101: Nutanix 101
NF101: Nutanix 101NF101: Nutanix 101
NF101: Nutanix 101
 
Citrix XenDesktop and XenApp 7.5 Architecture Deployment
Citrix XenDesktop and XenApp 7.5 Architecture DeploymentCitrix XenDesktop and XenApp 7.5 Architecture Deployment
Citrix XenDesktop and XenApp 7.5 Architecture Deployment
 
Enterprise single sign on
Enterprise single sign onEnterprise single sign on
Enterprise single sign on
 
Cyberark training pdf
Cyberark training pdfCyberark training pdf
Cyberark training pdf
 
Performance Monitoring and Testing in the Salesforce Cloud
Performance Monitoring and Testing in the Salesforce CloudPerformance Monitoring and Testing in the Salesforce Cloud
Performance Monitoring and Testing in the Salesforce Cloud
 
VMware HCI solutions - 2020-01-16
VMware HCI solutions - 2020-01-16VMware HCI solutions - 2020-01-16
VMware HCI solutions - 2020-01-16
 
SOC presentation- Building a Security Operations Center
SOC presentation- Building a Security Operations CenterSOC presentation- Building a Security Operations Center
SOC presentation- Building a Security Operations Center
 
Implementing an Application Security Pipeline in Jenkins
Implementing an Application Security Pipeline in JenkinsImplementing an Application Security Pipeline in Jenkins
Implementing an Application Security Pipeline in Jenkins
 
CCNA Security 02- fundamentals of network security
CCNA Security 02-  fundamentals of network securityCCNA Security 02-  fundamentals of network security
CCNA Security 02- fundamentals of network security
 
SAP Single Sign-On 2.0 Overview
SAP Single Sign-On 2.0 OverviewSAP Single Sign-On 2.0 Overview
SAP Single Sign-On 2.0 Overview
 
Salesforce開発で気を付けたいポイント
Salesforce開発で気を付けたいポイントSalesforce開発で気を付けたいポイント
Salesforce開発で気を付けたいポイント
 
Balbix-New-CISO-Board-Deck.pptx
Balbix-New-CISO-Board-Deck.pptxBalbix-New-CISO-Board-Deck.pptx
Balbix-New-CISO-Board-Deck.pptx
 
クラウド & STAR-CCM+ を活用するための勘ドコロ
クラウド & STAR-CCM+ を活用するための勘ドコロクラウド & STAR-CCM+ を活用するための勘ドコロ
クラウド & STAR-CCM+ を活用するための勘ドコロ
 

Similar to Sap Security Hacks and Mitigation - Timeless Attacks

An easy way into your sap systems v3.0
An easy way into your sap systems v3.0An easy way into your sap systems v3.0
An easy way into your sap systems v3.0
Cyber Security Alliance
 
Attacks Based on Security Configurations
Attacks Based on Security ConfigurationsAttacks Based on Security Configurations
Attacks Based on Security Configurations
Onapsis Inc.
 
SAP HANA Security: New Technology, New Risks
SAP HANA Security: New Technology, New RisksSAP HANA Security: New Technology, New Risks
SAP HANA Security: New Technology, New Risks
Virtual Forge
 
Practical SAP pentesting workshop (NullCon Goa)
Practical SAP pentesting workshop (NullCon Goa)Practical SAP pentesting workshop (NullCon Goa)
Practical SAP pentesting workshop (NullCon Goa)
ERPScan
 
Static Analysis Security Testing for Dummies... and You
Static Analysis Security Testing for Dummies... and YouStatic Analysis Security Testing for Dummies... and You
Static Analysis Security Testing for Dummies... and You
Kevin Fealey
 
ITCamp 2018 - Tobiasz Koprowski - Secure your data at rest - on demand, now!
ITCamp 2018 - Tobiasz Koprowski - Secure your data at rest - on demand, now!ITCamp 2018 - Tobiasz Koprowski - Secure your data at rest - on demand, now!
ITCamp 2018 - Tobiasz Koprowski - Secure your data at rest - on demand, now!
ITCamp
 
Locking down server and workstation operating systems
Locking down server and workstation operating systemsLocking down server and workstation operating systems
Locking down server and workstation operating systems
Ben Rothke
 
Detecting Problems in Industrial Networks Through Continuous Monitoring, Leve...
Detecting Problems in Industrial Networks Through Continuous Monitoring, Leve...Detecting Problems in Industrial Networks Through Continuous Monitoring, Leve...
Detecting Problems in Industrial Networks Through Continuous Monitoring, Leve...
Digital Bond
 
Protect4S - Seguridad total en sus sistemas SAP
Protect4S - Seguridad total en sus sistemas SAPProtect4S - Seguridad total en sus sistemas SAP
Protect4S - Seguridad total en sus sistemas SAP
Tomas Martinez
 
Текториал по тематике информационной безопасности
Текториал по тематике информационной безопасности Текториал по тематике информационной безопасности
Текториал по тематике информационной безопасности
Cisco Russia
 
EAS-SEC: Framework for securing business applications
EAS-SEC: Framework for securing business applicationsEAS-SEC: Framework for securing business applications
EAS-SEC: Framework for securing business applications
ERPScan
 
SAP HANA & S/4HANA: How hackers are compromising S/4HANA and how you can prot...
SAP HANA & S/4HANA: How hackers are compromising S/4HANA and how you can prot...SAP HANA & S/4HANA: How hackers are compromising S/4HANA and how you can prot...
SAP HANA & S/4HANA: How hackers are compromising S/4HANA and how you can prot...
akquinet enterprise solutions GmbH
 
Application and Data Security in the Software Development Lifecycle
Application and Data Security in the Software Development Lifecycle Application and Data Security in the Software Development Lifecycle
Application and Data Security in the Software Development Lifecycle
Stephen Senkomago Musoke
 
The Mainframe's Role in Enterprise Security Management - Jean-Marc Darees
The Mainframe's Role in Enterprise Security Management - Jean-Marc DareesThe Mainframe's Role in Enterprise Security Management - Jean-Marc Darees
The Mainframe's Role in Enterprise Security Management - Jean-Marc Darees
NRB
 
What's New in Security for IBM i?
What's New in Security for IBM i?What's New in Security for IBM i?
What's New in Security for IBM i?
HelpSystems
 
Attacking SAP users with sapsploit
Attacking SAP users with sapsploit Attacking SAP users with sapsploit
Attacking SAP users with sapsploit
ERPScan
 
ciso-platform-annual-summit-2013-New Framework for ERP Security
ciso-platform-annual-summit-2013-New Framework for ERP Securityciso-platform-annual-summit-2013-New Framework for ERP Security
ciso-platform-annual-summit-2013-New Framework for ERP Security
Priyanka Aash
 
Information Security Lesson 4 - Baselines - Eric Vanderburg
Information Security Lesson 4 - Baselines - Eric VanderburgInformation Security Lesson 4 - Baselines - Eric Vanderburg
Information Security Lesson 4 - Baselines - Eric Vanderburg
Eric Vanderburg
 
Runecast Analyzer Overview
Runecast Analyzer OverviewRunecast Analyzer Overview
Runecast Analyzer Overview
Stanimir Markov
 
Securing your web applications a pragmatic approach
Securing your web applications a pragmatic approachSecuring your web applications a pragmatic approach
Securing your web applications a pragmatic approach
Antonio Parata
 

Similar to Sap Security Hacks and Mitigation - Timeless Attacks (20)

An easy way into your sap systems v3.0
An easy way into your sap systems v3.0An easy way into your sap systems v3.0
An easy way into your sap systems v3.0
 
Attacks Based on Security Configurations
Attacks Based on Security ConfigurationsAttacks Based on Security Configurations
Attacks Based on Security Configurations
 
SAP HANA Security: New Technology, New Risks
SAP HANA Security: New Technology, New RisksSAP HANA Security: New Technology, New Risks
SAP HANA Security: New Technology, New Risks
 
Practical SAP pentesting workshop (NullCon Goa)
Practical SAP pentesting workshop (NullCon Goa)Practical SAP pentesting workshop (NullCon Goa)
Practical SAP pentesting workshop (NullCon Goa)
 
Static Analysis Security Testing for Dummies... and You
Static Analysis Security Testing for Dummies... and YouStatic Analysis Security Testing for Dummies... and You
Static Analysis Security Testing for Dummies... and You
 
ITCamp 2018 - Tobiasz Koprowski - Secure your data at rest - on demand, now!
ITCamp 2018 - Tobiasz Koprowski - Secure your data at rest - on demand, now!ITCamp 2018 - Tobiasz Koprowski - Secure your data at rest - on demand, now!
ITCamp 2018 - Tobiasz Koprowski - Secure your data at rest - on demand, now!
 
Locking down server and workstation operating systems
Locking down server and workstation operating systemsLocking down server and workstation operating systems
Locking down server and workstation operating systems
 
Detecting Problems in Industrial Networks Through Continuous Monitoring, Leve...
Detecting Problems in Industrial Networks Through Continuous Monitoring, Leve...Detecting Problems in Industrial Networks Through Continuous Monitoring, Leve...
Detecting Problems in Industrial Networks Through Continuous Monitoring, Leve...
 
Protect4S - Seguridad total en sus sistemas SAP
Protect4S - Seguridad total en sus sistemas SAPProtect4S - Seguridad total en sus sistemas SAP
Protect4S - Seguridad total en sus sistemas SAP
 
Текториал по тематике информационной безопасности
Текториал по тематике информационной безопасности Текториал по тематике информационной безопасности
Текториал по тематике информационной безопасности
 
EAS-SEC: Framework for securing business applications
EAS-SEC: Framework for securing business applicationsEAS-SEC: Framework for securing business applications
EAS-SEC: Framework for securing business applications
 
SAP HANA & S/4HANA: How hackers are compromising S/4HANA and how you can prot...
SAP HANA & S/4HANA: How hackers are compromising S/4HANA and how you can prot...SAP HANA & S/4HANA: How hackers are compromising S/4HANA and how you can prot...
SAP HANA & S/4HANA: How hackers are compromising S/4HANA and how you can prot...
 
Application and Data Security in the Software Development Lifecycle
Application and Data Security in the Software Development Lifecycle Application and Data Security in the Software Development Lifecycle
Application and Data Security in the Software Development Lifecycle
 
The Mainframe's Role in Enterprise Security Management - Jean-Marc Darees
The Mainframe's Role in Enterprise Security Management - Jean-Marc DareesThe Mainframe's Role in Enterprise Security Management - Jean-Marc Darees
The Mainframe's Role in Enterprise Security Management - Jean-Marc Darees
 
What's New in Security for IBM i?
What's New in Security for IBM i?What's New in Security for IBM i?
What's New in Security for IBM i?
 
Attacking SAP users with sapsploit
Attacking SAP users with sapsploit Attacking SAP users with sapsploit
Attacking SAP users with sapsploit
 
ciso-platform-annual-summit-2013-New Framework for ERP Security
ciso-platform-annual-summit-2013-New Framework for ERP Securityciso-platform-annual-summit-2013-New Framework for ERP Security
ciso-platform-annual-summit-2013-New Framework for ERP Security
 
Information Security Lesson 4 - Baselines - Eric Vanderburg
Information Security Lesson 4 - Baselines - Eric VanderburgInformation Security Lesson 4 - Baselines - Eric Vanderburg
Information Security Lesson 4 - Baselines - Eric Vanderburg
 
Runecast Analyzer Overview
Runecast Analyzer OverviewRunecast Analyzer Overview
Runecast Analyzer Overview
 
Securing your web applications a pragmatic approach
Securing your web applications a pragmatic approachSecuring your web applications a pragmatic approach
Securing your web applications a pragmatic approach
 

Recently uploaded

Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |
AstuteBusiness
 
Christine's Product Research Presentation.pptx
Christine's Product Research Presentation.pptxChristine's Product Research Presentation.pptx
Christine's Product Research Presentation.pptx
christinelarrosa
 
Day 2 - Intro to UiPath Studio Fundamentals
Day 2 - Intro to UiPath Studio FundamentalsDay 2 - Intro to UiPath Studio Fundamentals
Day 2 - Intro to UiPath Studio Fundamentals
UiPathCommunity
 
Session 1 - Intro to Robotic Process Automation.pdf
Session 1 - Intro to Robotic Process Automation.pdfSession 1 - Intro to Robotic Process Automation.pdf
Session 1 - Intro to Robotic Process Automation.pdf
UiPathCommunity
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
MichaelKnudsen27
 
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
DanBrown980551
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
Jakub Marek
 
Mutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented ChatbotsMutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented Chatbots
Pablo GĂłmez Abajo
 
Apps Break Data
Apps Break DataApps Break Data
Apps Break Data
Ivo Velitchkov
 
Harnessing the Power of NLP and Knowledge Graphs for Opioid Research
Harnessing the Power of NLP and Knowledge Graphs for Opioid ResearchHarnessing the Power of NLP and Knowledge Graphs for Opioid Research
Harnessing the Power of NLP and Knowledge Graphs for Opioid Research
Neo4j
 
From Natural Language to Structured Solr Queries using LLMs
From Natural Language to Structured Solr Queries using LLMsFrom Natural Language to Structured Solr Queries using LLMs
From Natural Language to Structured Solr Queries using LLMs
Sease
 
High performance Serverless Java on AWS- GoTo Amsterdam 2024
High performance Serverless Java on AWS- GoTo Amsterdam 2024High performance Serverless Java on AWS- GoTo Amsterdam 2024
High performance Serverless Java on AWS- GoTo Amsterdam 2024
Vadym Kazulkin
 
Leveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and StandardsLeveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and Standards
Neo4j
 
What is an RPA CoE? Session 2 – CoE Roles
What is an RPA CoE?  Session 2 – CoE RolesWhat is an RPA CoE?  Session 2 – CoE Roles
What is an RPA CoE? Session 2 – CoE Roles
DianaGray10
 
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
Fwdays
 
"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota
Fwdays
 
"$10 thousand per minute of downtime: architecture, queues, streaming and fin...
"$10 thousand per minute of downtime: architecture, queues, streaming and fin..."$10 thousand per minute of downtime: architecture, queues, streaming and fin...
"$10 thousand per minute of downtime: architecture, queues, streaming and fin...
Fwdays
 
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectorsConnector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
DianaGray10
 
JavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green MasterplanJavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green Masterplan
Miro Wengner
 
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Pitangent Analytics & Technology Solutions Pvt. Ltd
 

Recently uploaded (20)

Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |
 
Christine's Product Research Presentation.pptx
Christine's Product Research Presentation.pptxChristine's Product Research Presentation.pptx
Christine's Product Research Presentation.pptx
 
Day 2 - Intro to UiPath Studio Fundamentals
Day 2 - Intro to UiPath Studio FundamentalsDay 2 - Intro to UiPath Studio Fundamentals
Day 2 - Intro to UiPath Studio Fundamentals
 
Session 1 - Intro to Robotic Process Automation.pdf
Session 1 - Intro to Robotic Process Automation.pdfSession 1 - Intro to Robotic Process Automation.pdf
Session 1 - Intro to Robotic Process Automation.pdf
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
 
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
 
Mutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented ChatbotsMutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented Chatbots
 
Apps Break Data
Apps Break DataApps Break Data
Apps Break Data
 
Harnessing the Power of NLP and Knowledge Graphs for Opioid Research
Harnessing the Power of NLP and Knowledge Graphs for Opioid ResearchHarnessing the Power of NLP and Knowledge Graphs for Opioid Research
Harnessing the Power of NLP and Knowledge Graphs for Opioid Research
 
From Natural Language to Structured Solr Queries using LLMs
From Natural Language to Structured Solr Queries using LLMsFrom Natural Language to Structured Solr Queries using LLMs
From Natural Language to Structured Solr Queries using LLMs
 
High performance Serverless Java on AWS- GoTo Amsterdam 2024
High performance Serverless Java on AWS- GoTo Amsterdam 2024High performance Serverless Java on AWS- GoTo Amsterdam 2024
High performance Serverless Java on AWS- GoTo Amsterdam 2024
 
Leveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and StandardsLeveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and Standards
 
What is an RPA CoE? Session 2 – CoE Roles
What is an RPA CoE?  Session 2 – CoE RolesWhat is an RPA CoE?  Session 2 – CoE Roles
What is an RPA CoE? Session 2 – CoE Roles
 
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
 
"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota
 
"$10 thousand per minute of downtime: architecture, queues, streaming and fin...
"$10 thousand per minute of downtime: architecture, queues, streaming and fin..."$10 thousand per minute of downtime: architecture, queues, streaming and fin...
"$10 thousand per minute of downtime: architecture, queues, streaming and fin...
 
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectorsConnector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
 
JavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green MasterplanJavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green Masterplan
 
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
 

Sap Security Hacks and Mitigation - Timeless Attacks