SlideShare a Scribd company logo
World®
’16
Gaps	in	Your	Defense:
Hacking	the	Mainframe
Philip	Young	- Co-Founder	- ZedSec 390
MFT175S
MAINFRAME	AND	WORKLOAD	AUTOMATION
2 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
©	2016	CA.	All	rights	reserved.	All	trademarks	referenced	herein	belong	to	their	respective	companies.
The	content	provided	in	this CA	World	2016	presentation	is	intended	for	informational	purposes	only	and	does	not	form	any	type	
of	warranty. The information	provided	by	a	CA	partner	and/or	CA	customer	has	not	been	reviewed	for	accuracy	by	CA.	
For	Informational	Purposes	Only	
Terms	of	this	Presentation
3 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Abstract
The	mainframe	is	the	mission-essential	backbone	of	the	
enterprise,	housing	over	70	percent	of	corporate	data,	
touching	more	than	half	of	all	applications,	and	connecting	to	
the	internet	and	Internet	of	Things	(IoT)	through	APIs.	
However,	in	the	enterprise	security	discussion,	the	mainframe	
is	often	presumed	to	be	inherently	secure.	This	session	will	
dive	into	the	current	state	of	mainframe	of	mainframe	hacking,	
why	hackers	are	taking	a	larger	interest	in	the	platform,	a	
discussion	of	compliance	versus	security	and	next	steps	on	
how	you	can	optimize	the	security	of	your	most	mission-
essential	business	asset.
Philip
Young
ZedSec 390
Co-Founder
4 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Disclaimer
I’m	not	here	in	the	name	of	or	
on	behalf	of	my	employer.	
All	opinions	expressed	here	are	
my	own.
Philip
Young
ZedSec 390
Co-Founder
5 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
6 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
7 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
8 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
9 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
10 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
11 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Logica Security	Incident	Investigation:	Bilaga_A.pdf
Source:	https://wikileaks.org/gottfrid-docs/
12 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Castle	Walls	Under	Digital	Siege:	Risk-based	Security	for	z/OS	– CA	World	‘15
Source:	https://www.youtube.com/watch?v=CySiZOaY2T0
13 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Common	Myths
IT’S	NOT	ON	THE	INTERNET
IT’S	IMPENETRABLE
HACKERS	DON’T	KNOW	ABOUT	ITHACKERS	DON’T	KNOW	ABOUT	IT
BUT	WE’RE	AUDITED	ALL	OF	THE	TIME
14 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
The	‘IMP’
§ Started	in	2013
§ Tools:
– MassScan
– Nmap
– Python
– X3270
– Linux	VPS
§ Database	of	400+	mainframes
https://mainframesproject.tumblr.com/
Internet	Mainframes	Project
15 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
16 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
17 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
18 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
19 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
It	Doesn’t	Matter
20 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Enterprises	are	Flat
§ Many	large	enterprises	experienced	a	breach	
in	2015
§ Flat	networks
§ No	firewall	between	“Corporate”	network	and	
mainframe
21 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Hacking	the	Unhackable
§ From	the	network
§ No	knowledge	of	the	system
§ Steps
– Gather	information
– Profile	the	system
– Launch	attacks
Tools	released/updated	in	2015/2016
22 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Nmap in	2015/2016
•Anon?
•SITE?
•OS	Version?
•Information
•VTAM?
•CICS?
•TSO?
•Version?
•Nikto?
•BURP?
•Enumerate?
•Java	Objects
23 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
TN3270	
Screen
24 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
VTAM	
Enumeration
25 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
TSO	User	
Enumeration
26 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
27 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
CICS	
Transaction	
Enumeration
28 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
R
e
m
o
v
e
d
R
e
m
o
v
e
d
R
e
m
o
v
e
d
29 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
CICSpwn
30 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
CICSpwn:	
TSO	Shell
31 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
CICSpwn:	
TSO	Shell
32 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
FTP	
Authorized	
Code	Exec
33 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
What	Can	I	Do?
§ Compliance	is	literally	the	start
§ Just	because	you’re	compliant	doesn’t	mean:
– The	compliance	rules	are	well	done
– Represent	current	threats
– Match	current	baselines
§ Vulnerability	Scanning?
34 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Gap	Assessment
§ Compare	your	requirements	to	a	standard
§ How	do	you	compare	and	contrast?
§ Who’s	expertise	are	you	relying	on?
35 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Go	Beyond	Compliance
§ zAssure?
§ Identifying	Data	Assets?
§ Logging	and	Monitoring?
– zSecure
– IronStream
– Vanguard
§ Penetration	Testing?
36 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
CICSpwn
https://github.com/ayoul3/cic
spwn
Nmap Scripts
https://github.com/zedsec390
/NMAP
Metasploit
https://github.com/rapid7/me
tasploit-framework
Contact	&	References
Twitter:	@mainframed767
E-Mail:	mainframed767@gmail.com
37 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Stay	connected	at	communities.ca.com
Thank	you.
38 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Must	See	Demos
Real-Time	Data	
Security	&	Compliance	
CA	Data	Content	
Discovery
Mainframe	Theatre
Mainframe	Security	
Smart	Bar
CA	Top	Secret
Mainframe	Theatre
Real-Time	Data	
Security	&	Compliance	
CA	Compliance	
Event	Manager
Mainframe	Theatre
Mainframe	Security	
Smart	Bar
CA	ACF2
Mainframe	Theatre
39 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Mainframe	and	Workload	Automation
For	more	information	on	Mainframe	and	Workload	Automation,		
please	visit:	http://cainc.to/9GQ2JI

More Related Content

PDF
Encryption and Hashing and Keys – Oh, my! Demystifying Interoperable Encrypti...
PDF
Applying Data Science to Your Business Problem
PDF
How Do US and EU Cybersecurity and Data Protection Policy Developments Impact...
PDF
What the Open Mainframe Project Could Mean for You
PDF
Introduction to Identity-as-a-Service and Secure Access to SaaS
PDF
Tech Talk: Make life easy for your users with a hybrid application launchpad
PDF
CA World - mft1755 - gaps in your defense hacking the mainframe - philip young
PDF
Case Study: Molina Exceeds Customer Expectations With an Adaptable, Audit-Rea...
Encryption and Hashing and Keys – Oh, my! Demystifying Interoperable Encrypti...
Applying Data Science to Your Business Problem
How Do US and EU Cybersecurity and Data Protection Policy Developments Impact...
What the Open Mainframe Project Could Mean for You
Introduction to Identity-as-a-Service and Secure Access to SaaS
Tech Talk: Make life easy for your users with a hybrid application launchpad
CA World - mft1755 - gaps in your defense hacking the mainframe - philip young
Case Study: Molina Exceeds Customer Expectations With an Adaptable, Audit-Rea...

What's hot (6)

PDF
Case Study: Avoid an Integration Apocalypse with DevTest Solutions
PDF
Case Study: EBSCO Executes Data-Driven Deployments in CA Release Automation f...
PPTX
Remastering Your Business for a Digital World
PDF
Digical is the Imminent Reality
PDF
Tech Talk: Problem Prevention With Operational Intelligence
PDF
Cwin16 - lyon - agility and salesforce
Case Study: Avoid an Integration Apocalypse with DevTest Solutions
Case Study: EBSCO Executes Data-Driven Deployments in CA Release Automation f...
Remastering Your Business for a Digital World
Digical is the Imminent Reality
Tech Talk: Problem Prevention With Operational Intelligence
Cwin16 - lyon - agility and salesforce

Viewers also liked (6)

PDF
Case Study: Ameren Improves Response time to Grid Outages with CA Workload Au...
PDF
Benefits of Upgrading to CA Workload Automation CA 7® Edition r12
PDF
Pre-Con Ed: CA Workload Automation iDash for CA Workload Automation CA 7 r12 ...
PDF
Pre-Con Ed: Deep Dive into CA Workload Automation Agent Job Types
PDF
Case Study: UPS Enables Organizational Efficiencies Through the Use of CA Wor...
PDF
Olaf Kolkman - FIRST Keynote on Collaborative Security
Case Study: Ameren Improves Response time to Grid Outages with CA Workload Au...
Benefits of Upgrading to CA Workload Automation CA 7® Edition r12
Pre-Con Ed: CA Workload Automation iDash for CA Workload Automation CA 7 r12 ...
Pre-Con Ed: Deep Dive into CA Workload Automation Agent Job Types
Case Study: UPS Enables Organizational Efficiencies Through the Use of CA Wor...
Olaf Kolkman - FIRST Keynote on Collaborative Security

Similar to Gaps in Your Defense: Hacking the Mainframe (20)

PDF
Is Complacency Around Mainframe Security a Disaster Waiting to Happen?
PDF
Tech Talk: In the Voice of a Mainframe Millennial: How Can Mainframe Security...
PDF
Castle Walls Under Digital Siege: Risk-based Security for z/OS
PDF
Pre-Con Ed: Real-Time Data Audit and Security: Find, Classify and Protect Sen...
PDF
Insecure magazine - 52
PDF
Linux & Open Source Panel: Driving New Innovation and Value on Your Mainframe
PDF
Intelligent Mainframe Management and the Drive Toward No-Touch Automation
PDF
Mainframe Opening Keynote Address: Mainframe Reframed for the Application Eco...
PDF
How to Protect Your Mainframe from Hackers (v1.0)
PDF
Ciberseguridad en el mundo de la IA
PDF
The Importance of Mainframe Security Education
PDF
Ten Things You Should not Forget in Mainframe Security
PDF
(2019) Hack All the Way Through From Fridge to Mainframe (v0.2)
PDF
ALMUERZO DE TRABAJO CHECKPOINT - SECURE SOFT
PDF
New Mainframe IT Analytics: Actionable Insight into Root Cause Analysis of Pe...
PPTX
OS Security Evolution & Latest Attack Vectors By Jacob Torrey
PDF
Charlotte ISSA - 2016 - Mainframe Hacking
PPTX
Defcon 18 "Hacking Electronic Door Access Controllers"
PPTX
First line of defense for cybersecurity : AI
ODP
Ph d proposal_20070809
Is Complacency Around Mainframe Security a Disaster Waiting to Happen?
Tech Talk: In the Voice of a Mainframe Millennial: How Can Mainframe Security...
Castle Walls Under Digital Siege: Risk-based Security for z/OS
Pre-Con Ed: Real-Time Data Audit and Security: Find, Classify and Protect Sen...
Insecure magazine - 52
Linux & Open Source Panel: Driving New Innovation and Value on Your Mainframe
Intelligent Mainframe Management and the Drive Toward No-Touch Automation
Mainframe Opening Keynote Address: Mainframe Reframed for the Application Eco...
How to Protect Your Mainframe from Hackers (v1.0)
Ciberseguridad en el mundo de la IA
The Importance of Mainframe Security Education
Ten Things You Should not Forget in Mainframe Security
(2019) Hack All the Way Through From Fridge to Mainframe (v0.2)
ALMUERZO DE TRABAJO CHECKPOINT - SECURE SOFT
New Mainframe IT Analytics: Actionable Insight into Root Cause Analysis of Pe...
OS Security Evolution & Latest Attack Vectors By Jacob Torrey
Charlotte ISSA - 2016 - Mainframe Hacking
Defcon 18 "Hacking Electronic Door Access Controllers"
First line of defense for cybersecurity : AI
Ph d proposal_20070809

More from CA Technologies (20)

PPTX
CA Mainframe Resource Intelligence
PDF
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
PDF
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
PDF
Case Study: How The Home Depot Built Quality Into Software Development
PDF
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
PDF
Case Study: Privileged Access in a World on Time
PDF
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
PDF
Case Study: Putting Citizens at The Center of Digital Government
PDF
Making Security Work—Implementing a Transformational Security Program
PDF
Keynote: Making Security a Competitive Advantage
PDF
Emerging Managed Services Opportunities in Identity and Access Management
PDF
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
PDF
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
PDF
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
PDF
Application Experience Analytics Services: The Strategic Digital Transformati...
PDF
Application Experience Analytics Services: The Strategic Digital Transformati...
PDF
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
PDF
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
PDF
Blockchain: Strategies for Moving From Hype to Realities of Deployment
PDF
Establish Digital Trust as the Currency of Digital Enterprise
CA Mainframe Resource Intelligence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How The Home Depot Built Quality Into Software Development
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Case Study: Privileged Access in a World on Time
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: Putting Citizens at The Center of Digital Government
Making Security Work—Implementing a Transformational Security Program
Keynote: Making Security a Competitive Advantage
Emerging Managed Services Opportunities in Identity and Access Management
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Blockchain: Strategies for Moving From Hype to Realities of Deployment
Establish Digital Trust as the Currency of Digital Enterprise

Recently uploaded (20)

PPTX
Spectroscopy.pptx food analysis technology
PPT
Teaching material agriculture food technology
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
DOCX
The AUB Centre for AI in Media Proposal.docx
PPTX
MYSQL Presentation for SQL database connectivity
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
Empathic Computing: Creating Shared Understanding
PDF
cuic standard and advanced reporting.pdf
PDF
NewMind AI Weekly Chronicles - August'25-Week II
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PPTX
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PPTX
sap open course for s4hana steps from ECC to s4
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Spectroscopy.pptx food analysis technology
Teaching material agriculture food technology
Spectral efficient network and resource selection model in 5G networks
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Reach Out and Touch Someone: Haptics and Empathic Computing
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
The AUB Centre for AI in Media Proposal.docx
MYSQL Presentation for SQL database connectivity
Encapsulation_ Review paper, used for researhc scholars
Empathic Computing: Creating Shared Understanding
cuic standard and advanced reporting.pdf
NewMind AI Weekly Chronicles - August'25-Week II
“AI and Expert System Decision Support & Business Intelligence Systems”
Chapter 3 Spatial Domain Image Processing.pdf
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
Review of recent advances in non-invasive hemoglobin estimation
Per capita expenditure prediction using model stacking based on satellite ima...
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
sap open course for s4hana steps from ECC to s4
Agricultural_Statistics_at_a_Glance_2022_0.pdf

Gaps in Your Defense: Hacking the Mainframe