ACDC (Was: z/OS and Metasploit...)

2013-12-14 Thread Ed Jaffe
On 12/9/2013 10:14 PM, Ed Gould wrote: I have never worked on a ACDC system. Neither have I, but the band is awesome! ;-) -- Edward E Jaffe Phoenix Software International, Inc 831 Parkview Drive North El Segundo, CA 90245 http://www.phoenixsoftware.com/

Re: ACDC (Was: z/OS and Metasploit...)

2013-12-14 Thread Scott Ford
We have ACDC and love the band ..oh yeah Scott ford www.identityforge.com from my IPAD 'Infinite wisdom through infinite means' On Dec 14, 2013, at 9:53 AM, Ed Jaffe edja...@phoenixsoftware.com wrote: On 12/9/2013 10:14 PM, Ed Gould wrote: I have never worked on a ACDC system. Neither

Re: z/OS and Metasploit

2013-12-12 Thread Terry Sambrooks
Hi Peter/Wayne Irrespective of what Userid was used or not perhaps we could agree that the system 'hacked' was not a typical z/OS System but one provided by IBM for bone fide developers. The Userid ADCDMST may not have been used to gain access but if it is the owner of the file, which seems

Re: z/OS and Metasploit

2013-12-12 Thread Phil Smith
Terry Sambrooks wrote: Irrespective of what Userid was used or not perhaps we could agree that the system 'hacked' was not a typical z/OS System but one provided by IBM for bone fide developers. The Userid ADCDMST may not have been used to gain access but if it is the owner of the file, which

Re: z/OS and Metasploit

2013-12-11 Thread Peter Vander Woude
I'm not sure where everyone saw the ADCDMST userid being used. When I viewed the video, I saw the userid used, for the ftp, to be bt0, and that is set at around the 30 second mark into the video. I agree with many, who have participated in this discussion, that RACF can be configured to

Re: z/OS and Metasploit

2013-12-11 Thread Wayne Bickerdike
To Peter Vander Woude: Did you watch the video? If so you missed the display at 2:24 which clearly shows ADCDMST and SYS1 group access. In this case, I would wager with you that this is an ADCD system and the video maker set it all up. Yes I agree with your ramble but I'm glad you aren't an eye

Re: z/OS and Metasploit

2013-12-11 Thread Peter Vander Woude
Wayne Bickerdike wrote To Peter Vander Woude Did you watch the video? If so you missed the display at 2:24 which clearly shows ADCDMST and SYS1 group access. In this case, I would wager with you that this is an ADCD system and the video maker set it all up. Yes I agree with your ramble but I'm

z/OS and Metasploit

2013-12-09 Thread Phil Smith
One of our folks sent me this YouTube video of a presentation from BayThreat. Metasploit allegedly used to compromise a z/OS machine. Looks like it uses ftp and a legit user credential to maybe escalate privileges, but not clear. No sound on the video (~ 3 mins).

Re: z/OS and Metasploit

2013-12-09 Thread Wayne Bickerdike
Almost certainly a bootleg z/OS 1.10 running on Hercules. ADCD distribution. The ADCD build has a documented IBMUSER/password combination. The IP address used is a clue too. Very amateurish Someone put an ADCD z/OS 1.10 on a torrent a few years ago so it's probably a copy of that. On Tue,

Re: z/OS and Metasploit

2013-12-09 Thread Wayne Bickerdike
Just looked a bit closer. The user ID is ADCDMST. If it's a legit system, the ADCDMST user id has SYS1, RACF special and could be the supplied default password was in use. Strongly suspect it's a bootleg system. On Tue, Dec 10, 2013 at 6:05 AM, Wayne Bickerdike wayn...@gmail.com wrote: Almost

Re: z/OS and Metasploit

2013-12-09 Thread R.S.
W dniu 2013-12-09 20:08, Wayne Bickerdike pisze: Just looked a bit closer. The user ID is ADCDMST. If it's a legit system, the ADCDMST user id has SYS1, RACF special and could be the supplied default password was in use. Strongly suspect it's a bootleg system. So what? Bootleg system is less

Re: z/OS and Metasploit

2013-12-09 Thread Binyamin Dissen
On Mon, 9 Dec 2013 10:55:29 -0800 Phil Smith p...@voltage.com wrote: :One of our folks sent me this YouTube video of a presentation from BayThreat. Metasploit allegedly used to compromise a z/OS machine. Looks like it uses ftp and a legit user credential to maybe escalate privileges, but not

Re: z/OS and Metasploit

2013-12-09 Thread John McKown
I agree with Binyamin. If you can submit a job (via ftp in this example), you can run something which can listen on an unprotected TCPIP port. What's the big deal? If you can't upload a compiled program, you can use REXX socket support to write your code in REXX, copy it from sysin to a member of

Re: z/OS and Metasploit

2013-12-09 Thread Phil Smith
Thanks for the replies; this confirms what I'd guessed: not a serious threat. Well, guessed isn't right-I was SURE it wasn't serious, but needed some data to say why. -- For IBM-MAIN subscribe / signoff / archive access

Re: z/OS and Metasploit

2013-12-09 Thread R.S.
W dniu 2013-12-09 22:02, Phil Smith pisze: Thanks for the replies; this confirms what I'd guessed: not a serious threat. Well, guessed isn't right-I was SURE it wasn't serious, but needed some data to say why. Yes, and no. No - because hacker need to know user/password. Yes, because it is

Re: z/OS and Metasploit

2013-12-09 Thread Wayne Bickerdike
*So what? Bootleg system is less secure by definition? z/OS is secure or not, it has nothing to do with licensing.* * Of course usage of well known user/password says nothing about system strength, but a lot about system administrator.* What I mean is that this is probably *his* bootleg system,

Re: z/OS and Metasploit

2013-12-09 Thread Ed Gould
Wayne: I have never worked on a ACDC system. However there are are other IBM (MVS VM) where they come with *KNOWN* passwords (for installation) and that is clearly documented. The point they (I am guessing here) that having the passwords is dangerous in insecure and yes it is. The point