A Logo

Feel free to include my content in your page via my
RSS feed

Help Irongeek.com pay for
bandwidth and research equipment:

Subscribestar or Patreon

Search Irongeek.com:

Affiliates:
Irongeek Button
Social-engineer-training Button

Help Irongeek.com pay for bandwidth and research equipment:

paypalpixle


We Hacked the Gibson! Now what? - Philip Young (BSides Las Vegas 2014) (Hacking Illustrated Series InfoSec Tutorial Videos)

We Hacked the Gibson! Now what?
Philip Young

IBM has been touting the security of the mainframe for over 30 years. So much so, that the cult of mainframers believes that the platform is impenetrable. Just try showing how your new attack vector works and you'll be met with 101 reasons why it wouldn't work (until you prove them wrong of course). This talk will take direct aim at the cultist! Previous talks about mainframe security only got you to the front door. Leaving many asking 'great, I got a userid/password, now what?!'. That's what this talk is about: the ‘Now what’. You'll learn a few new techniques to penetrate the mainframe (without a userid/password) and then a bunch of attacks, tricks and mischief you can do to further maintain that access, find important files and really go after the mainframe. During this very Demo Heavy talk you'll learn how to take advantage of APF files, SSL key management, cgi-bin in TYooL 2014, what NJE is and why it's bad, why REXX and SETUID are dangerous and how simple backdoors still work (and will likely go undetected).

Bio: Soldier of Fortran (SoF) use to work as an auditor and was thrown into the lions pit of mainframes with very little support. He heard how secure it was, assumed everything worked as described and never questioned the system programmers. That was ten years ago. In those ten years he’s dedicated himself to mainframe security research. No longer satisfied with always being told how secure their systems are he started to develop tools, workplans and attack vectors to really see how secure they were. In 2012 he submitted a talk to the proving ground track at BSidesLV and was accepted. Since then he’s given talks about mainframes at Thotcon, BSidesAustin, Shmoocon and BlackHat! Don’t fear, he hates giving the same talk more than once and never presents the same talk twice!

Back to BSides Las Vegas 2014 video list

Printable version of this article

15 most recent posts on Irongeek.com:


If you would like to republish one of the articles from this site on your webpage or print journal please contact IronGeek.

Copyright 2020, IronGeek
Louisville / Kentuckiana Information Security Enthusiast