From Unknown Parameter to Root: A Story of Unexpected Intrusion Testing Results

In the past thirteen years, SAP still has an endless stream of vulnerabilities patched, some of which are not known to the world, however, they are hidden threats that could lead to disasters. This time we would like to tell a story. A story where everything starts from a classical pentest against a SAP System […]

CLOSING KEYNOTE: Systems Alchemy: The Transmutation of Hacking

Everywhere we look we find complex systems creating, enabling, controlling and shaping the fabric of modern life. The critical infrastructure of society is dependent on systems, mostly privately owned, that have same the inherent problems of all complex systems. In this keynote we examine the properties of systems and how understanding them creates new opportunities […]