I'm not saying that it comes down to dynalloc. Security never comes down to a 
single exploitation. Think about alcatraz which despite all the extreme 
security measures still had an escape. I'm sayiing that dynalloc is not 
controlled by security admins and there are simple scenario's to exploit it.
Jon.

    On Saturday, December 23, 2017 12:15 AM, David Stokes <[email protected]> 
wrote:
 
 >>How can RACF stop someone when they have a legitimate need
It can't of course. That's why the Target attack (like most others) essentially 
revolved around a bit of social engineering and getting access to a privileged 
account. Along with poor malware detection, lack of network segregation and 
various other factors. The systems were basically running on Microsoft 
Virtualization and other MS facilities. To suggest this all comes down to 
"Dynamic Allocation" which is unique to MVS based systems (due to its two-level 
dataset access via DDs) is a bit of a stretch. Limiting dynalloc via more 
security software would still be open to privilege elevation attacks.

   

Reply via email to