There are reasons why you might want to check the security (strength) of an SAP implementation's passwords. Maybe during an external SAP security assessment or during an internal review.
In this post, I'll cover some of the latest vulnerabilities reported to SAP by Onapsis and published last week.
In our previous post, we were able to understand the topology and configuration in place, useful whenever you want to analyze how secure a SAProuter implementation is. In this article, we'll check if our SAProuter is secure or whether it would be possible for an attacker to retrieve information and connect to our internal network.
Hello there, my name is Nahuel D. Sanchez and I work as a Security Researcher at the Onapsis Research Labs.
Welcome to the Onapsis ERP Security Blog!
While leading organizations are already taking measures to protect their ERP systems from the increased threat of cyber-attacks, at Onapsis we feel that “leading” is not enough. We realize that still a significant number of organizations are not able to answer a very important question: “Is my ERP implementation secure?” At Onapsis, we know this uncertainty only empowers the bad guys and we feel it’s our duty to level the battlefield. That's why we created this Blog.