
SAP Security Assessment Methodology Part 2 -Credential-less Attack Vectors
You can read Part 1 here. It may be possible that multiple SAP servers could run across different systems. Identify all the servers before proceeding with the assessment. This [more]