SHARE 2017 Mainframe Pentesting SHARE 2017 Ransomware Mainframe Checkmate
Thanks to the folks at ConFoo.ca for hosting my guest post to their blog:
Not having a clear track to [the fresh talent] pipeline is the single biggest security issue and threat to this platform there is.
Next week at SHARE – San Jose, I’m giving a talk on ransomware on z/OS. I’ve been asked multiple times if I thought ransomware could happen on Z, is it possible: Unequivocally yes. Come see this talk and watch a live demonstration of how this might work. If you are responsible for mainframe security, work for a company… Continue reading Is that ransomware on your mainframe?
I was asked a week or so ago whether or not I thought z/OS would be susceptible to the types of Java deserialization attacks we’ve seen (a great primer from Fox Glove Security). Of course!, I replied. However, I don’t like unsubstantiated claims – so I built this POC: It uses the basic ysoserial… Continue reading Mainframes – Java – Deserialization
I started writing a list of topics I’ve learned, some in excruciating detail, some just enough to know where to look for further details (trust me, that is no small feat). I’m writing this not only as a way of keeping me honest on those days when nothing goes right, but also as a way to… Continue reading Things I’ve Learned (and things to come)
The first z/OS exploit module in the Metasploit Framework, landed last Friday. This is an exploit which takes advantage of a default or poorly configured FTP server. And, it requires valid credentials. However, given this (and it’s a very common configuration), you will be presented with a very nice Unix shell – allowing for deeper… Continue reading A logical first step
Had a great interview with Patrick on the Risky Business podcast. Listen here: