Post Exploitation Enumeration Mainframe Hacking - Security Opener
Project and Program:
Enterprise Data Center,
Security and Compliance
Tags:
Proceedings,
SHARE Sacramento 2018,
2018
This session continues the set of talks from SHARE 2017 about mainframe penetration testing and hacking. In the previous sessions, the emphasis was on using misconfigured items to gain access (CICS, FTP, Web, etc).
In this session, the speaker will demonstrate what an attacker can do once they have access to the mainframe environment using new tools released in 2017 (and some not so new tools). The new tools were developed to aid penetration testers in identifying potential avenues of exploit and help pinpoint system weaknesses. In this talk we will walk through how the tools were created, what tasks they perform, how they perform them and how you can use them to help secure your environment.-Philip Young-Security
Back to Proceedings File Library