Star 0

Abstract

"Everytime you call an Uber, you trigger a Mainframe transaction." This is a lot to expect from a legacy system dating back to the 60s..or is it? These platforms are literally holding the world's economy, yet very few pentesters take the time to drill down these machines, compared to Windows and Linux. Lack of tools? accessibility? openess about the platform?...So many hurdles that this talk will attempt to address by presenting practical attacks against an IBM Z Mainframe. How to get a shell on the machine? Escalate privileges? Even impersonate other processes on z/OS to wreak havoc on the machine. If you like offensive tools, obscure low level code and esoteric systems, you are most welcome!

Slides