An out-of-the-box installation of JDE is vulnerable to compromise from many vectors. This session will demonstrate how to leverage various vulnerabilities to gain elevated access to a JDE system. Simultaneously we will discuss the appropriate hardening mechanism to prevent these exploits.
Compromising a JDE System: A Cookbook
Watch the full-length video
Premium Content: access is limited to Quest Corporate and Professional members.
Membership has its perks. Get unlimited access to the latest Oracle updates, event session replays, strategic content centers and special members-only programming, plus big discounts on conference registration, with a Quest Corporate or Professional membership. Quest is where you learn.