LBRY Block Explorer

LBRY Claims • black-hat-usa-2018-mainframe-z-os

309113e5a732d3280acfa8ff335e7d5541f84a05

Published By
Created On
2 Sep 2020 11:38:31 UTC
Transaction ID
Cost
Safe for Work
Free
Yes
Black Hat USA 2018 - Mainframe [z/OS] Reverse Engineering and Exploit Development
Speak with any Fortune 500 running mainframe and they'll tell you two things: (1) without their mainframes they'd be out of business (2) they do not conduct any security research on them, let alone vulnerability scans. The most infuriating part is that mainframes are simply computers, they're different from what you're used to, but that doesn't mean they can't be hacked. Previous talks about this topic have covered the platform from a high level, imploring you to do the basics. This talk continues this series of talks, given by others, around mainframe hacking. Previously covered topics included network penetration testing and privilege escalation. To complement those talks, this talk will expose attendees to the various tools that exist on the platform to help you do your own reverse engineering, followed by detailed steps on how to start your own exploit development. Attendees will learn what debuggers are available on the platform, such as dbx and ASMIDF, as well as the challenges you'll have using them. After learning how to RE, attendees will then learn how to develop their own exploits and buffer overflows on the platform using C, assembler and JCL. A demo program will be used to teach all these items so people can follow along. Topics included in this discussion are APF authorization, bypassing RACF/ACEE, TSO, Unix System Services.
...
https://www.youtube.com/watch?v=opBLBYAR8tU
Author
Content Type
Unspecified
video/mp4
Language
Unspecified
Open in LBRY

More from the publisher

Controlling
VIDEO
DEF C
Controlling
VIDEO
DEF C
Controlling
VIDEO
DEF C
Controlling
VIDEO
32C3
Controlling
VIDEO
BLACK
Controlling
VIDEO
28C3
Controlling
VIDEO
DEF C
Controlling
VIDEO
31C3
Controlling
VIDEO
31C3