SlideShare ist ein Scribd-Unternehmen logo
1 von 39
Downloaden Sie, um offline zu lesen
World®
’16
Gaps	in	your	Defense:	
Hacking	the	Mainframe	
Philip	Young,	Co-Founder,	ZedSec	390	
MFT1755	
MAINFRAME	AND	WORKLOAD	AUTOMATION
2	 ©	2016	CA.	ALL	RIGHTS	RESERVED.	@CAWORLD				#CAWORLD	
©	2016	CA.	All	rights	reserved.	All	trademarks	referenced	herein	belong	to	their	respecve	companies.	
The	content	provided	in	this	CA	World	2016	presentaon	is	intended	for	informaonal	purposes	only	and	does	not	form	any	type	
of	warranty.	The	informaon	provided	by	a	CA	partner	and/or	CA	customer	has	not	been	reviewed	for	accuracy	by	CA.		
For	Informaonal	Purposes	Only		
Terms	of	this	Presentaon
3	 ©	2016	CA.	ALL	RIGHTS	RESERVED.	@CAWORLD				#CAWORLD	
Abstract	
The	mainframe	is	the	mission-essenal	backbone	of	the	enterprise,	housing	over	70	percent	of	
corporate	data,	touching	more	than	half	of	all	applicaons,	and	connecng	to	the	internet	and	
Internet	of	Things	(IoT)	through	APIs.	However,	in	the	enterprise	security	discussion,	the	
mainframe	is	oaen	presumed	to	be	inherently	secure.	This	session	will	dive	into	the	current	
state	of	mainframe	of	mainframe	hacking,	why	hackers	are	taking	a	larger	interest	in	the	
plaborm,	a	discussion	of	compliance	versus	security	and	next	steps	on	how	you	can	opmize	the	
security	of	your	most	mission-essenal	business	asset.	
Philip	Young	
ZedSec	390	
Co-Founder
4	 ©	2016	CA.	ALL	RIGHTS	RESERVED.	@CAWORLD				#CAWORLD	
Disclaimer	
I’m	not	here	in	the	name	of	or	
on	behalf	of	my	employer.	All	
opinions	expressed	here	are	my	
own.	
Philip	Young	
ZedSec	390	
Co-Founder
5	 ©	2016	CA.	ALL	RIGHTS	RESERVED.	@CAWORLD				#CAWORLD
6	 ©	2016	CA.	ALL	RIGHTS	RESERVED.	@CAWORLD				#CAWORLD
7	 ©	2016	CA.	ALL	RIGHTS	RESERVED.	@CAWORLD				#CAWORLD
8	 ©	2016	CA.	ALL	RIGHTS	RESERVED.	@CAWORLD				#CAWORLD
9	 ©	2016	CA.	ALL	RIGHTS	RESERVED.	@CAWORLD				#CAWORLD
10	 ©	2016	CA.	ALL	RIGHTS	RESERVED.	@CAWORLD				#CAWORLD
11	 ©	2016	CA.	ALL	RIGHTS	RESERVED.	@CAWORLD				#CAWORLD	
Logica	Security	Incident	Inves3ga3on:	Bilaga_A.pdf	
Source:	h=ps://wikileaks.org/goArid-docs/
12	 ©	2016	CA.	ALL	RIGHTS	RESERVED.	@CAWORLD				#CAWORLD	
Castle	Walls	Under	Digital	Siege:	Risk-based	Security	for	z/OS	–	CA	World	‘15	
Source:	h=ps://www.youtube.com/watch?v=CySiZOaY2T0
13	 ©	2016	CA.	ALL	RIGHTS	RESERVED.	@CAWORLD				#CAWORLD	
Common	Myths	
IT’S	NOT	ON	THE	INTERNET	
IT’S	IMPENETRABLE	
HACKERS	DON’T	KNOW	ABOUT	IT	HACKERS	DON’T	KNOW	ABOUT	IT	
BUT	WE’RE	AUDITED	ALL	THE	TIME!?
14	 ©	2016	CA.	ALL	RIGHTS	RESERVED.	@CAWORLD				#CAWORLD	
The	‘IMP’	
§  Started	in	2013	
§  Tools:	
–  MassScan	
–  Nmap	
–  Python	
–  X3270	
–  Linux	VPS	
§  Database	of	400+	mainframes	
hkps://mainframesproject.tumblr.com/	
Internet	Mainframes	Project
15	 ©	2016	CA.	ALL	RIGHTS	RESERVED.	@CAWORLD				#CAWORLD
16	 ©	2016	CA.	ALL	RIGHTS	RESERVED.	@CAWORLD				#CAWORLD
17	 ©	2016	CA.	ALL	RIGHTS	RESERVED.	@CAWORLD				#CAWORLD
18	 ©	2016	CA.	ALL	RIGHTS	RESERVED.	@CAWORLD				#CAWORLD
19	 ©	2016	CA.	ALL	RIGHTS	RESERVED.	@CAWORLD				#CAWORLD	
It	Doesn’t	Ma=er
20	 ©	2016	CA.	ALL	RIGHTS	RESERVED.	@CAWORLD				#CAWORLD	
Enterprises	are	Flat	
§  Many	large	enterprises	experienced	a	breach	
in	2015	
§  Flat	networks	
§  No	firewall	between	“Corporate”	network	and	
mainframe
21	 ©	2016	CA.	ALL	RIGHTS	RESERVED.	@CAWORLD				#CAWORLD	
Hacking	the	Unhackable	
§  From	the	network	
§  No	knowledge	of	the	system	
§  Steps	
–  Gather	informaon	
–  Profile	the	system	
–  Launch	akacks	
Tools	released/updated	in	2015/2016
22	 ©	2016	CA.	ALL	RIGHTS	RESERVED.	@CAWORLD				#CAWORLD	
Nmap	in	2015/2016	
• Anon?	
• SITE?	
• OS	Version?	
• Informaon	
• VTAM?	
• CICS?	
• TSO?	
• Version?	
• Nikto?	
• BURP?	
• Enumerate?	
• Java	Objects
23	 ©	2016	CA.	ALL	RIGHTS	RESERVED.	@CAWORLD				#CAWORLD	
TN3270	
Screen
24	 ©	2016	CA.	ALL	RIGHTS	RESERVED.	@CAWORLD				#CAWORLD	
VTAM	
Enumeraon
25	 ©	2016	CA.	ALL	RIGHTS	RESERVED.	@CAWORLD				#CAWORLD	
TSO	User	
Enumeraon
26	 ©	2016	CA.	ALL	RIGHTS	RESERVED.	@CAWORLD				#CAWORLD
27	 ©	2016	CA.	ALL	RIGHTS	RESERVED.	@CAWORLD				#CAWORLD	
CICS	
Transacon	
Enumeraon
28	 ©	2016	CA.	ALL	RIGHTS	RESERVED.	@CAWORLD				#CAWORLD
29	 ©	2016	CA.	ALL	RIGHTS	RESERVED.	@CAWORLD				#CAWORLD	
CICSpwn
30	 ©	2016	CA.	ALL	RIGHTS	RESERVED.	@CAWORLD				#CAWORLD	
CICSpwn:	
TSO	Shell
31	 ©	2016	CA.	ALL	RIGHTS	RESERVED.	@CAWORLD				#CAWORLD	
CICSpwn:	
TSO	Shell
32	 ©	2016	CA.	ALL	RIGHTS	RESERVED.	@CAWORLD				#CAWORLD	
FTP	
Authorized	
Code	Exec
33	 ©	2016	CA.	ALL	RIGHTS	RESERVED.	@CAWORLD				#CAWORLD	
What	Can	I	Do?	
§  Compliance	is	literally	the	start	
§  Just	because	you’re	compliant	doesn’t	mean:	
–  The	compliance	rules	are	well	done	
–  Represent	current	threats	
–  Match	current	baselines	
§  Vulnerability	Scanning?
34	 ©	2016	CA.	ALL	RIGHTS	RESERVED.	@CAWORLD				#CAWORLD	
Gap	Assessment	
§  Compare	your	requirements	to	a	standard	
§  How	do	you	compare	and	contrast?	
§  Who’s	experse	are	you	relying	on?
35	 ©	2016	CA.	ALL	RIGHTS	RESERVED.	@CAWORLD				#CAWORLD	
Go	Beyond	Compliance	
§  zAssure?	
§  Idenfying	Data	Assets?	
§  Logging	and	Monitoring?	
–  zSecure	
–  IronStream	
–  Vanguard	
§  Penetraon	Tesng?
36	 ©	2016	CA.	ALL	RIGHTS	RESERVED.	@CAWORLD				#CAWORLD	
Quesons?
37	 ©	2016	CA.	ALL	RIGHTS	RESERVED.	@CAWORLD				#CAWORLD	
CICSpwn	
h=ps://github.com/ayoul3/
cicspwn	
Nmap	Scripts	
h=ps://github.com/
zedsec390/NMAP	
	
Metasploit	
h=ps://github.com/rapid7/
metasploit-framework	
	
Contact	&	References	
Twi=er:	@mainframed767	
E-Mail:	mainframed767@gmail.com
38	 ©	2016	CA.	ALL	RIGHTS	RESERVED.	@CAWORLD				#CAWORLD	
Stay	connected	at	communies.ca.com	
Thank	you.
@CAWORLD					#CAWORLD	 ©	2016	CA.	All	RIGHTS	RESERVED.	39	 @CAWORLD					#CAWORLD	
Mainframe	and	Workload	
Automa3on	
For	more	informaon	on	Mainframe	and	Workload	Automaon,		
please	visit:	hkp://cainc.to/9GQ2JI

Weitere ähnliche Inhalte

Ähnlich wie CA World - mft1755 - gaps in your defense hacking the mainframe - philip young

Ähnlich wie CA World - mft1755 - gaps in your defense hacking the mainframe - philip young (20)

Gaps in Your Defense: Hacking the Mainframe
Gaps in Your Defense: Hacking the Mainframe Gaps in Your Defense: Hacking the Mainframe
Gaps in Your Defense: Hacking the Mainframe
 
Tech Talk: In the Voice of a Mainframe Millennial: How Can Mainframe Security...
Tech Talk: In the Voice of a Mainframe Millennial: How Can Mainframe Security...Tech Talk: In the Voice of a Mainframe Millennial: How Can Mainframe Security...
Tech Talk: In the Voice of a Mainframe Millennial: How Can Mainframe Security...
 
How is Buying a Home Like Justifying Data Security Investments? Developing Re...
How is Buying a Home Like Justifying Data Security Investments? Developing Re...How is Buying a Home Like Justifying Data Security Investments? Developing Re...
How is Buying a Home Like Justifying Data Security Investments? Developing Re...
 
Enterprise Developers, Linux and z Systems - What you Need to Know
Enterprise Developers, Linux and z Systems - What you Need to KnowEnterprise Developers, Linux and z Systems - What you Need to Know
Enterprise Developers, Linux and z Systems - What you Need to Know
 
Is Complacency Around Mainframe Security a Disaster Waiting to Happen?
Is Complacency Around Mainframe Security a Disaster Waiting to Happen?Is Complacency Around Mainframe Security a Disaster Waiting to Happen?
Is Complacency Around Mainframe Security a Disaster Waiting to Happen?
 
Encryption and Hashing and Keys – Oh, my! Demystifying Interoperable Encrypti...
Encryption and Hashing and Keys – Oh, my! Demystifying Interoperable Encrypti...Encryption and Hashing and Keys – Oh, my! Demystifying Interoperable Encrypti...
Encryption and Hashing and Keys – Oh, my! Demystifying Interoperable Encrypti...
 
CA UIM for z Systems Technical Deep Dive: Get the Right People Solving Probl...
CA UIM for z Systems Technical  Deep Dive: Get the Right People Solving Probl...CA UIM for z Systems Technical  Deep Dive: Get the Right People Solving Probl...
CA UIM for z Systems Technical Deep Dive: Get the Right People Solving Probl...
 
Pre-Con Ed: How to IAM-Enable Your Office 365 Environment
Pre-Con Ed: How to IAM-Enable Your Office 365 EnvironmentPre-Con Ed: How to IAM-Enable Your Office 365 Environment
Pre-Con Ed: How to IAM-Enable Your Office 365 Environment
 
Securely Enabling the Digital Age
Securely Enabling the Digital AgeSecurely Enabling the Digital Age
Securely Enabling the Digital Age
 
Technology Primer: Ensure Deep Visibility into IBM® DataPower using Nastel® A...
Technology Primer: Ensure Deep Visibility into IBM® DataPower using Nastel® A...Technology Primer: Ensure Deep Visibility into IBM® DataPower using Nastel® A...
Technology Primer: Ensure Deep Visibility into IBM® DataPower using Nastel® A...
 
Pre-Con Ed: CA OPS/MVS and the Power of Integration
Pre-Con Ed: CA OPS/MVS and the Power of IntegrationPre-Con Ed: CA OPS/MVS and the Power of Integration
Pre-Con Ed: CA OPS/MVS and the Power of Integration
 
Tech Talk: Federate to an SAML-Enabled App in Minutes
Tech Talk: Federate to an SAML-Enabled App in MinutesTech Talk: Federate to an SAML-Enabled App in Minutes
Tech Talk: Federate to an SAML-Enabled App in Minutes
 
Pre-Con Ed: CA Live API Creator:  Learn How to Integrate Data From Enterprise...
Pre-Con Ed: CA Live API Creator:  Learn How to Integrate Data From Enterprise...Pre-Con Ed: CA Live API Creator:  Learn How to Integrate Data From Enterprise...
Pre-Con Ed: CA Live API Creator:  Learn How to Integrate Data From Enterprise...
 
Pre-Con Ed: High Performance Masking and Test Data Generation for IMS and DB2
Pre-Con Ed: High Performance Masking and Test Data Generation for IMS and DB2Pre-Con Ed: High Performance Masking and Test Data Generation for IMS and DB2
Pre-Con Ed: High Performance Masking and Test Data Generation for IMS and DB2
 
Tracking Message Flows in DataPower With CA APM
Tracking Message Flows in DataPower With CA APMTracking Message Flows in DataPower With CA APM
Tracking Message Flows in DataPower With CA APM
 
The Importance of Mainframe Security Education
The Importance of Mainframe Security Education The Importance of Mainframe Security Education
The Importance of Mainframe Security Education
 
The Top Three Cloud Security Mythbusters
The Top Three Cloud Security MythbustersThe Top Three Cloud Security Mythbusters
The Top Three Cloud Security Mythbusters
 
API’s and Identity: Enabling Optum to become the HealthCare cloud
API’s and Identity: Enabling Optum to become the HealthCare cloudAPI’s and Identity: Enabling Optum to become the HealthCare cloud
API’s and Identity: Enabling Optum to become the HealthCare cloud
 
Pre-Con Ed: Bridge the Gap From Alert Suppression to MTTR Through Enterprise ...
Pre-Con Ed: Bridge the Gap From Alert Suppression to MTTR Through Enterprise ...Pre-Con Ed: Bridge the Gap From Alert Suppression to MTTR Through Enterprise ...
Pre-Con Ed: Bridge the Gap From Alert Suppression to MTTR Through Enterprise ...
 
Enabling a Hybrid Enterprise Application Launch Pad
Enabling a Hybrid Enterprise Application Launch PadEnabling a Hybrid Enterprise Application Launch Pad
Enabling a Hybrid Enterprise Application Launch Pad
 

Kürzlich hochgeladen

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Kürzlich hochgeladen (20)

Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 

CA World - mft1755 - gaps in your defense hacking the mainframe - philip young