conference logo

Playlist "27C3: We Come In Peace"

Rootkits and Trojans on Your SAP Landscape

Ertunga Arsal

SAP systems are the heart of many enterprises. Most critical business functions run on SAP Applications and the complexity of these systems makes it very difficult to protect against attackers. Default setups, forgotten/unimplemented security configurations, weak password management and change processes that apply to one ‘unimportant’ system can result in complete compromise of the SAP landscape.