Sap R/3 Protocol Reverse Engineering

No ratings

Presented at Chaos Communication Congress 21 by

Most hackers perceive SAP R/3 installations as enormous data graves with limited hack value because of its immense size and doubtful design. However, there are usually lots of company relevant data. As it is good and common practise, the more valuable the data, the less it is protected.