# update 3/31 – added Reverse Shell JCL – this can be used by any direct-to-JES2 delivery method (e.g. FTP, NJE, etc) PR #6737 In continuation of adding more mainframe functionality to Metasploit, I’ve built (and am in the process of incorporating) JCL (job control language)-based payloads (and exploits which use them) within the framework. Once… Continue reading JCL Scripting for Metasploit-Framework
I’m presenting on RACF passwords and self-encrypting drives. See you there!
Learn about RACF KDFAES, Password cracking, Self-Encrypting Drives
A thoughtful review of the existing IBM debuggers for z/OS
Mainframe Insecuritites or Hack the Gibson. No, Really!
When Metasploit meets Mainframe
TL;DR ->Earlier this year IBM updated (and made backwards compatible to z/os v1r12) their RACF password hashing/encryption technology – and it’s awesome. The APAR OA43999 has been out for months and, after you research and test it, you should apply it then migrate your users to the stronger algorithm as soon as you can. This increases the… Continue reading RACF gets serious about password encryption.
Here are the slides to my Derbycon talk on mainframe security. Mainframe Hacking – Derbycon 5.0 Mainframe Hacking Video – Derbycon 5.0
Here’s a teaser on the talk I’m giving at Derbycon 5.0. Mainframe Pentesting / Security. No more excuses.
This is an addendum to the last post. Here is shellcode (and it’s stripped down source) that achieve the same goal as the prior post. The difference is the payload is XOR encoded and the shellcode, and it’s source, have a built in decoder stub that decodes the payload in memory then jumps to… Continue reading Bind Shell – shellcode and source