It may be possible that multiple SAP servers could run across different systems. Identify all the servers before proceeding with the assessment. This is so, as all the SAP servers [more]
The post SAP Security Assessment Methodology Part 2 -Credential-less Attack Vectors appeared first on Checkmate.
Article Link: https://niiconsulting.com/checkmate/2020/12/sap-security-assessment-methodology-part-2-credential-less-attack-vectors/