SlideShare a Scribd company logo
@bigendiansmalls@bigendiansmalls
Learning mainframe
hacking
@bigendiansmalls@bigendiansmalls
The puzzle
• Learn how to mainframe
– Architecture
– Language
– Vernacular
• Make it easier for others
• Build and Port Tools
• Get the word out
@bigendiansmalls@bigendiansmalls
/ME
• Enjoys RE, ASM, Learning, Not taking no
for an answer
• Relative n00b to MF haxoring
• Loves a good puzzle
• Really excited about continuing to teach
ppl bout Gibsons
• Here on behalf of myself, not employer
IN HONOR OF HACKERS 20YR
ANNIVERSARY, I BRING YOU:
@bigendiansmalls@bigendiansmalls
5 stages of learning
mainframe
1. DENIAL
@bigendiansmalls@bigendiansmalls
DENIAL
• Most secure platform
– If configured correctly **
• Antiquated tech – on it’s way out
• Can’t be exploited by traditional
means
• A quick review:
@bigendiansmalls@bigendiansmalls
obsolescence
• Not.
• Google it.
• That’s enough
@bigendiansmalls@bigendiansmalls
Antiquated
• Ha!
• Possible 100% uptime, protection
against data loss
• 5.5ghz 6 core ooo CISC
– 100+ cores / TB’s of RAM
– Nearly limitless storage etc etc
@bigendiansmalls@bigendiansmalls
Trad’L hax no apply
• Things like buffer overflows?
• RCE?
@bigendiansmalls@bigendiansmalls
Gut check
@bigendiansmalls@bigendiansmalls
@bigendiansmalls@bigendiansmalls
Trad’L hax no apply
• Well ……
@bigendiansmalls@bigendiansmalls
5 stages of learning
mainframe
1. DENIAL
2. ANGER
@bigendiansmalls@bigendiansmalls
ANGER
• This is a complicated system
• People help
– Pay for it = good
– Search for it = lulz
• Manuals: thorough. Really
thorough
@bigendiansmalls@bigendiansmalls
People un-help
@bigendiansmalls@bigendiansmalls
@bigendiansmalls@bigendiansmalls
Doco help overload
• Manuals with IP in the title:
– 16 Manuals in
– 59.39 MB of PDF files
– 13,384 Pages
– Which one? Let’s read the titles:
@bigendiansmalls@bigendiansmalls
• IPv6 Network and Application Design Guide
• IP Diagnosis Guide
• (IP) New Function Summary
• IP Configuration Guide
• IP Configuration Reference
• IP Programmer's Guide and Reference
• IP User's Guide and Commands
• IP System Administrator's Commands
• IP Sockets Application Programming Interface
Guide and Reference
• IP CICS Sockets Guide
• IP IMS Sockets Guide
• IP Network Print Facility
• IP Messages Volume 1 (EZA)
• IP Messages Volume 2 (EZB, EZD)
• IP Messages Volume 3 (EZY)
• IP Messages Volume 4 (EZZ, SNM)
@bigendiansmalls@bigendiansmalls
5 stages of learning
mainframe
1. DENIAL
2. ANGER
3. BARGAINING
@bigendiansmalls@bigendiansmalls
BARGAINING
I Solemnly swear I will never, ever
complain about a buggy Makefile, if
you just let me please get this
simple SSHD server set up on a
mainframe before I die.
@bigendiansmalls@bigendiansmalls
5 stages of learning
mainframe
1. DENIAL
2. ANGER
3. BARGAINING
4. DEPRESSION
@bigendiansmalls@bigendiansmalls
Depression v1.0
• And also:
– Protocol droids - existing mainframe
workforce
– No tribal knowledge - Lack of
Howto's and FAQs
– Documentation Overload
@bigendiansmalls@bigendiansmalls
DEPRESSION v2.0
• Up against:
– Vernacular – Words you have never
heard or different meanings.
– Tools - designed for developing,
testing, and delivering complex
workable production systems
– No public disclosure
@bigendiansmalls@bigendiansmalls
@bigendiansmalls@bigendiansmalls
5 stages of learning
mainframe
1. DENIAL
2. ANGER
3. BARGAINING
4. DEPRESSION
5. ACCEPTANCE
@bigendiansmalls@bigendiansmalls
ACCEPTANCE
• Writing code with only 2 manuals,
instead of 7.
• Help others get involved.
• Creating tools that others can use
• Still want to test / secure – but no
access or months to read
manuals? How about ….
@bigendiansmalls@bigendiansmalls
@bigendiansmalls@bigendiansmalls
metasploit
• What’s in thus far
– Basic payloads (3 kinds, 2 flavors)
• Bind / reverse shell w & w/o encoders
– Built-in Command Shell w/decoder
– Core files for translation, platform &
architecture definition
@bigendiansmalls@bigendiansmalls
Bind shell - enc
• ~1300 bytes (large!)
• Encoder included
• Can use any client to
connect, including std.
MSF Command Shell
@bigendiansmalls@bigendiansmalls
@bigendiansmalls@bigendiansmalls
Rev shell - noenc
• ~300 bytes (small for z)
• No encoder
• Must use client which
does translation (MSF now
includes!)
@bigendiansmalls@bigendiansmalls
@bigendiansmalls@bigendiansmalls
Post / Other
• With fundamentals in place
• Can do custom POST functions
• Direct command execution
– With screens
@bigendiansmalls@bigendiansmalls
@bigendiansmalls@bigendiansmalls
3270 WIP
• Early preview of native 3270
module in MSF
• Used to echo screens, enter raw
commands use valid credentials
for POST exploitation
@bigendiansmalls@bigendiansmalls
@bigendiansmalls@bigendiansmalls
What’s next
• GCC, GNU UTILS
• Debug framework is on the radare
• Further additions to MSF
– Customized Meterpreter
– JCL Creator
– Full TN3270 emulation
• File transfer / Command execution
• Moar training & teaching
@bigendiansmalls@bigendiansmalls
THANKS! CONTACT NFO
IBM
SoF – Graphics, moral support
Others in the community
http://www.bigendiansmalls.com
@bigendiansmalls
mainframe@bigendiansmalls
@bigendiansmalls@bigendiansmalls

More Related Content

PPTX
Share winter 2016 encryption
PPTX
Using ansible vault to protect your secrets
PDF
Defcon 22-philip-young-from-root-to-special-hacking-ibm-main
PPTX
NoSQL Exploitation Framework
PDF
Managing sensitive data with Ansible vault
PDF
Socially Acceptable Methods to Walk in the Front Door
PPTX
Exploiting NoSQL Like Never Before
PDF
ContainerDays NYC 2016: "The Secure Introduction Problem: Getting Secrets Int...
Share winter 2016 encryption
Using ansible vault to protect your secrets
Defcon 22-philip-young-from-root-to-special-hacking-ibm-main
NoSQL Exploitation Framework
Managing sensitive data with Ansible vault
Socially Acceptable Methods to Walk in the Front Door
Exploiting NoSQL Like Never Before
ContainerDays NYC 2016: "The Secure Introduction Problem: Getting Secrets Int...

What's hot (20)

PDF
[HES2013] Virtually secure, analysis to remote root 0day on an industry leadi...
PPTX
Laverna vs etherpad
PPTX
Secure360 - Extracting Password from Windows
PDF
Anatomy of a Cloud Hack
PPTX
Outlook and Exchange for the bad guys
PPTX
Reinventing anon email
PPTX
Docker Security
PPTX
Obfuscating The Empire
PDF
CNIT 124: Ch 9: Password Attacks
PDF
XFLTReat: a new dimension in tunnelling
PDF
Attack All the Layers - What's Working in Penetration Testing
PPTX
Sticky Keys to the Kingdom
PPTX
Dock ir incident response in a containerized, immutable, continually deploy...
PDF
Attack All the Layers: What's Working during Pentests (OWASP NYC)
PDF
NoSQL, no security?
PPTX
Re-thinking Performance tuning with HTTP2
ODP
Introduction to ethereum_public
PPTX
InSpec Workshop DevSecCon 2017
PPTX
44CON 2014 - Pentesting NoSQL DB's Using NoSQL Exploitation Framework, Franci...
PDF
"Infrastructure Security Practice" by Wasis Adi Putranto (OLX Indonesia)
[HES2013] Virtually secure, analysis to remote root 0day on an industry leadi...
Laverna vs etherpad
Secure360 - Extracting Password from Windows
Anatomy of a Cloud Hack
Outlook and Exchange for the bad guys
Reinventing anon email
Docker Security
Obfuscating The Empire
CNIT 124: Ch 9: Password Attacks
XFLTReat: a new dimension in tunnelling
Attack All the Layers - What's Working in Penetration Testing
Sticky Keys to the Kingdom
Dock ir incident response in a containerized, immutable, continually deploy...
Attack All the Layers: What's Working during Pentests (OWASP NYC)
NoSQL, no security?
Re-thinking Performance tuning with HTTP2
Introduction to ethereum_public
InSpec Workshop DevSecCon 2017
44CON 2014 - Pentesting NoSQL DB's Using NoSQL Exploitation Framework, Franci...
"Infrastructure Security Practice" by Wasis Adi Putranto (OLX Indonesia)

Similar to Mainframe Hacking - Derbycon 5.0 (20)

PPT
Unleash the power of Mainframes
PDF
BruCON 2010 Lightning Talks - DIY Grid Computing
PDF
Linux on System z Update: Current & Future Linux on System z Technology
ODP
Nagios Conference 2012 - Dan Wittenberg - Case Study: Scaling Nagios Core at ...
PDF
Unixtoolbox
PDF
Unixtoolbox
PDF
unixtoolbox.pdf
PDF
Unixtoolbox
PDF
Develop
PDF
unixtoolbox.pdf
PDF
unixtoolbox.pdf
PDF
PDF
unixtoolbox.pdf
PDF
PDF
unixtoolbox.pdf
PDF
PDF
PDF
unixtoolbox.pdf
PDF
PDF
Singularity
Unleash the power of Mainframes
BruCON 2010 Lightning Talks - DIY Grid Computing
Linux on System z Update: Current & Future Linux on System z Technology
Nagios Conference 2012 - Dan Wittenberg - Case Study: Scaling Nagios Core at ...
Unixtoolbox
Unixtoolbox
unixtoolbox.pdf
Unixtoolbox
Develop
unixtoolbox.pdf
unixtoolbox.pdf
unixtoolbox.pdf
unixtoolbox.pdf
unixtoolbox.pdf
Singularity

Recently uploaded (20)

PDF
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
PDF
Getting started with AI Agents and Multi-Agent Systems
PDF
Getting Started with Data Integration: FME Form 101
PPTX
TLE Review Electricity (Electricity).pptx
PPTX
Modernising the Digital Integration Hub
PDF
1 - Historical Antecedents, Social Consideration.pdf
PDF
NewMind AI Weekly Chronicles - August'25-Week II
PDF
Architecture types and enterprise applications.pdf
PDF
WOOl fibre morphology and structure.pdf for textiles
PPTX
Final SEM Unit 1 for mit wpu at pune .pptx
PPTX
The various Industrial Revolutions .pptx
PDF
Univ-Connecticut-ChatGPT-Presentaion.pdf
PPTX
observCloud-Native Containerability and monitoring.pptx
PDF
gpt5_lecture_notes_comprehensive_20250812015547.pdf
PDF
Enhancing emotion recognition model for a student engagement use case through...
PDF
Transform Your ITIL® 4 & ITSM Strategy with AI in 2025.pdf
PDF
August Patch Tuesday
PDF
TrustArc Webinar - Click, Consent, Trust: Winning the Privacy Game
PDF
Zenith AI: Advanced Artificial Intelligence
PPTX
1. Introduction to Computer Programming.pptx
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
Getting started with AI Agents and Multi-Agent Systems
Getting Started with Data Integration: FME Form 101
TLE Review Electricity (Electricity).pptx
Modernising the Digital Integration Hub
1 - Historical Antecedents, Social Consideration.pdf
NewMind AI Weekly Chronicles - August'25-Week II
Architecture types and enterprise applications.pdf
WOOl fibre morphology and structure.pdf for textiles
Final SEM Unit 1 for mit wpu at pune .pptx
The various Industrial Revolutions .pptx
Univ-Connecticut-ChatGPT-Presentaion.pdf
observCloud-Native Containerability and monitoring.pptx
gpt5_lecture_notes_comprehensive_20250812015547.pdf
Enhancing emotion recognition model for a student engagement use case through...
Transform Your ITIL® 4 & ITSM Strategy with AI in 2025.pdf
August Patch Tuesday
TrustArc Webinar - Click, Consent, Trust: Winning the Privacy Game
Zenith AI: Advanced Artificial Intelligence
1. Introduction to Computer Programming.pptx

Mainframe Hacking - Derbycon 5.0