Updated JCL in Metasploit Functionality

Recently updated my work in Metasploit to allow for editing of the JCL JOB card, in PR7221.

What this means for you senior and aspiring z/OS pentesters, is that you can tailor JCL you submit with valid CLASS,MSGCLASS,NOTIFY,ACCOUNTING etc.

This will allow for more success running jobs on different systems and, out of the box, it is set with defaults that will run quiet on most systems.

Next MSF project is a TN3270 layer, which will allow for scripted information gathering and attacks on systems – using the TN3270/TSO interface.