On 5/18/2013 1:17 PM, John McKown wrote:
http://mainframed767.tumblr.com/post/50574743147/big-iron-back-door-maintp-part-two

basically the person must be able to ftp into a UNIX subdirectory and
to submit a job. They upload a program called "netcat" into a data set
starting with their RACF id. They then submit a job which copies the
data set into the /tmp subdirectory with a "random" name, chmod the
name to be executable, then executes does starts the netcat in the
"background" (asynchronous to the batch job) and piping to/from the
z/OS UNIX shell. The "hacker" simply connects to the port that netcat
is listening on, and presto, they have a shell on their desktop.

netcat can be used to provide this kind of "back door" for any platform that runs TCP/IP. Even without netcat, a user can share his/her resources with others (sans password) by writing a simple "home grown" program (even in REXX!) that listens for and services requests directed to a given TCP/IP port.

The real question is whether there is an easy way to lock down this kind of (mostly harmless "hacking") without disrupting normal exploitation of TCP/IP by programs that wish to do so.

--
Edward E Jaffe
Phoenix Software International, Inc
831 Parkview Drive North
El Segundo, CA 90245
http://www.phoenixsoftware.com/

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [email protected] with the message: INFO IBM-MAIN

Reply via email to