Version Française [x_custom_headline type=”none” level=”h4″ looks_like=”h4″]Introduction[/x_custom_headline] From older SAP R/3 to the recent SAP Netweaver ABAP system, SAP username and password are stored encrypted directly in database. Fortunately, encryption mechanisms …
AntiForensics techniques : Process hiding in Kernel Mode
Introduction This article is the first iteration of a series introducing several malware techniques for both persistence and propagation. Most of these techniques were discovered and disclosed several years ago …
HIP – 25 Techniques to Gather Threat Intel and Track Actors (Wayne Huang, Sun Huang)
The last talk of this Hack in Paris 2017 was given by two speakers: Wayne Huang , founder and CEO of Armorize Technologies, VP Engineering at Proofpoint Sun Huang, Senior …
The security of ‘SAP Secure Storage’
Version Française [x_custom_headline type=”none” level=”h4″ looks_like=”h4″]Introduction[/x_custom_headline] What is SAP Secure Storage ? The SAP Secure Store is a SAP component allowing the encrypted storage of sensitive data that SAP application …