Checkmate
  • Checkmate Home
  • NII Home
  • Services
  • Products
    • FireSec
    • BlueScope
  • Research
  • Company

Articles by Syed Sajjad Mehdi

SAP Security Assessment Methodology Part 3 – Credential Centric Attack Vectors

January 22, 2021 Syed Sajjad Mehdi 0

Before proceeding with this methodology some SAP terminologies are to be understood: Client – A client is a 3-digit number that could be understood as a specific customer. This means [more]

SAP Security Assessment Methodology Part 2 -Credential-less Attack Vectors

December 31, 2020 Syed Sajjad Mehdi 0

You can read Part 1 here.   It may be possible that multiple SAP servers could run across different systems. Identify all the servers before proceeding with the assessment. This [more]

SAP Security Assessment Methodology Part 1 – A Penetration Tester Meets SAP

December 11, 2020 Syed Sajjad Mehdi 2

SAP is a software suite that offers standard business solutions; it is used by thousands of customers across the globe to manage their businesses to manage financial, asset, and cost [more]

Search

"What investments make the most sense when it comes to application security?"


Register for our Application Security – State of the Nation report and fill in the survey!

Recent Posts

  • SAP Security Assessment Methodology Part 3 – Credential Centric Attack Vectors
  • SAP Security Assessment Methodology Part 2 -Credential-less Attack Vectors
  • SAP Security Assessment Methodology Part 1 – A Penetration Tester Meets SAP
  • Active Subdomain Enumeration (Part 2)
  • Passive Subdomain Enumeration (Part 1)

Recent Comments

  • Anuraag B on SAP Security Assessment Methodology Part 1 – A Penetration Tester Meets SAP
  • Ailene Cerrito on Passive Subdomain Enumeration (Part 1)
  • Kevin Woytowicz on Passive Subdomain Enumeration (Part 1)
  • Mohamed Levreault on Passive Subdomain Enumeration (Part 1)
  • Pradip bendre on SAP Security Assessment Methodology Part 1 – A Penetration Tester Meets SAP

Search

Copyright © 2021 | WordPress Theme by MH Themes