Posted on April 20, 2016 | Filed under Blog
In the previous blog post about PeopleSoft Security we looked at the TockenChpoken attack and PeopleSoft SSO. Today we will go through all steps of exploitation of the attack which can help you during a PeopleSoft pentest. It consists of 3 key steps.
Read more »Posted on November 20, 2015 | Filed under Blog
Posted on September 2, 2015 | Filed under Blog