Please complete the registration form in order to download the publication. We will send you an email with your download link.
SAP has implemented several unique password hashing procedures in its history. While each new version has increased the security level of their hashing scheme, the requirements for backward compatibility, if not considered in the implementation phase, may provide an opportunity for attacks against users’ stored credentials. Through the exploitation of these weaknesses, malicious attackers would be able to escalate privileges over vulnerable systems and perform business processes while impersonating other users.
This SAP Security In-Depth volume details the evolution of these hashing mechanisms developed by SAP, analyzes the different risks levels of attacks targeting this sensitive information and provides practical mitigation processes to protect the company’s SAP platform.