eLearning
Operating System Command Injection Vulnerabilities

Like with all programming languages, ABAP® based applications can contain security flaws. Because of different programming paradigms, frameworks, and runtimes for ABAP®, the exploitability of a flaw and security code measures can vary. You'll learn to identify vulnerabilities to allow command execution on the operating system level in their different ABAP® code variations and what threats they can pose to the SAP system.



Objectives

   What are the risks of system command vulnerabilities in SAP ABAP® systems

   How to check ABAP® code for this kind of vulnerabilities

  How attackers can misuse these vulnerabilities

  How to mitigate the risks of unintended system command execution via ABAP® applications


Empty space, drag to resize
Duration

1 hour


Instructor

Course Access

24/7 - 365

Access and Infrastructure

 Technical Requirements

Certification

 Certificate Upon Completion

Price

149 € per course

Prerequisites

  • Read & Understand simple ABAP® implementations
  • Know the modularisation concept of ABAP®
  • Know the general frameworks for input processing
  • Know the fundamentals of software applications interacting with operating systems