Top SAP Security Threat Hunting Strategies Used by Elite Researchers
Security Unfiltered PodcastOctober 14, 202500:51:47

Top SAP Security Threat Hunting Strategies Used by Elite Researchers

A curiosity-fueled career moves from Atari and BBS days to leading research on a live SAP zero-day, with candid lessons on people skills, breaking into security, and holding the line when pressure spikes. We unpack how a benign SAP endpoint became an RCE chain and what it takes to defend complex systems at scale.

• early path from Commodore 64 and BBS to IT and security
• contrast between the Wild West era and today’s tool-rich learning
• help desk as a foundation for people skills and pressure
• practical advice for students on coding, protocols, Wireshark
• hiring by attitude, approach and aptitude over tool checklists
• navigating WAF pushback and risk acceptance with dev teams
• Onapsis research labs and SAP’s threat landscape
• deep-dive on the SAP 31324 Java gadget chain RCE
• attacker interest, attribution signals, and factory impact
• offensive research versus traditional pen testing
• building culture that rewards questions and learning

Find us: onapsis.com → Research Labs. Search “Onapsis 2025 31324” for our zero-day article. SAP thanked us in their patch notes. Connect with Paul on LinkedIn to talk SAP security, offensive work, or careers.

Chapters

00:00 The Journey into Cybersecurity
11:00 Navigating the Path to Cybersecurity
18:16 Overcoming Challenges in Security Communication
25:34 Navigating the Cybersecurity Career Path
28:07 The Importance of Attitude and Aptitude in Hiring
31:04 People Skills: The Key to Standing Out
33:24 Onapsis and the World of SAP Security
36:55 Understanding Zero-Day Vulnerabilities in SAP
44:50 Technical Deep Dive: The Mechanics of the Zero-Day Attack
49:30 Engaging with Threat Actors: Real-World Experiences
sap, Security, Cyber Security, Podcast, Zero-Day,