The SAP strategy is more and more in the spotlight, attackers start to realize the value of these kinds of systems, and we already see that "SAP " is simply a part of the attacker arsenal. Almost inevitably this leads to being mandated to execute forensic investigation over the SAP system... and what most people can imagine, it is simply a challenging activity! With more than 19 different data sources, located in different places (database, OS) with different formats (table, text file, proprietary format file) you must be prepared to. This is why we decided to compose and give a documentation about it, as exhaustively as possible, including explanation of all data sources, specificity, what to look for, limitations but besides possible anti-forensic techniques that investigators must be informed about. This talk focuses on the most crucial part of the whitepaper, effort to supply an easy as possible introduction to SAP forensic as well as show fewer anti-forensic techniques and protection about them.
https://confidence-conference.org/