On 12/9/2013 10:14 PM, Ed Gould wrote:
I have never worked on a ACDC system.
Neither have I, but the band is awesome! ;-)
--
Edward E Jaffe
Phoenix Software International, Inc
831 Parkview Drive North
El Segundo, CA 90245
http://www.phoenixsoftware.com/
We have ACDC and love the band ..oh yeah
Scott ford
www.identityforge.com
from my IPAD
'Infinite wisdom through infinite means'
On Dec 14, 2013, at 9:53 AM, Ed Jaffe edja...@phoenixsoftware.com wrote:
On 12/9/2013 10:14 PM, Ed Gould wrote:
I have never worked on a ACDC system.
Neither
Hi Peter/Wayne
Irrespective of what Userid was used or not perhaps we could agree that the
system 'hacked' was not a typical z/OS System but one provided by IBM for
bone fide developers.
The Userid ADCDMST may not have been used to gain access but if it is the
owner of the file, which seems
Terry Sambrooks wrote:
Irrespective of what Userid was used or not perhaps we could agree that the
system 'hacked' was not a typical z/OS System but one provided by IBM for
bone fide developers.
The Userid ADCDMST may not have been used to gain access but if it is the
owner of the file, which
I'm not sure where everyone saw the ADCDMST userid being used. When I viewed
the video, I saw the userid used, for the ftp, to be bt0, and that is set at
around the 30 second mark into the video.
I agree with many, who have participated in this discussion, that RACF can be
configured to
To Peter Vander Woude:
Did you watch the video? If so you missed the display at 2:24 which clearly
shows ADCDMST and SYS1 group access.
In this case, I would wager with you that this is an ADCD system and the
video maker set it all up.
Yes I agree with your ramble but I'm glad you aren't an eye
Wayne Bickerdike wrote
To Peter Vander Woude
Did you watch the video? If so you missed the display at 2:24 which clearly
shows ADCDMST and SYS1 group access.
In this case, I would wager with you that this is an ADCD system and the
video maker set it all up.
Yes I agree with your ramble but I'm
One of our folks sent me this YouTube video of a presentation from BayThreat.
Metasploit allegedly used to compromise a z/OS machine. Looks like it uses ftp
and a legit user credential to maybe escalate privileges, but not clear. No
sound on the video (~ 3 mins).
Almost certainly a bootleg z/OS 1.10 running on Hercules. ADCD
distribution. The ADCD build has a documented IBMUSER/password combination.
The IP address used is a clue too. Very amateurish
Someone put an ADCD z/OS 1.10 on a torrent a few years ago so it's probably
a copy of that.
On Tue,
Just looked a bit closer. The user ID is ADCDMST. If it's a legit system,
the ADCDMST user id has SYS1, RACF special and could be the supplied
default password was in use. Strongly suspect it's a bootleg system.
On Tue, Dec 10, 2013 at 6:05 AM, Wayne Bickerdike wayn...@gmail.com wrote:
Almost
W dniu 2013-12-09 20:08, Wayne Bickerdike pisze:
Just looked a bit closer. The user ID is ADCDMST. If it's a legit system,
the ADCDMST user id has SYS1, RACF special and could be the supplied
default password was in use. Strongly suspect it's a bootleg system.
So what? Bootleg system is less
On Mon, 9 Dec 2013 10:55:29 -0800 Phil Smith p...@voltage.com wrote:
:One of our folks sent me this YouTube video of a presentation from BayThreat.
Metasploit allegedly used to compromise a z/OS machine. Looks like it uses ftp
and a legit user credential to maybe escalate privileges, but not
I agree with Binyamin. If you can submit a job (via ftp in this example),
you can run something which can listen on an unprotected TCPIP port. What's
the big deal? If you can't upload a compiled program, you can use REXX
socket support to write your code in REXX, copy it from sysin to a member
of
Thanks for the replies; this confirms what I'd guessed: not a serious threat.
Well, guessed isn't right-I was SURE it wasn't serious, but needed some data
to say why.
--
For IBM-MAIN subscribe / signoff / archive access
W dniu 2013-12-09 22:02, Phil Smith pisze:
Thanks for the replies; this confirms what I'd guessed: not a serious threat. Well,
guessed isn't right-I was SURE it wasn't serious, but needed some data to say
why.
Yes, and no.
No - because hacker need to know user/password.
Yes, because it is
*So what? Bootleg system is less secure by definition? z/OS is secure or
not, it has nothing to do with licensing.*
* Of course usage of well known user/password says nothing about system
strength, but a lot about system administrator.*
What I mean is that this is probably *his* bootleg system,
Wayne:
I have never worked on a ACDC system.
However there are are other IBM (MVS VM) where they come with
*KNOWN* passwords (for installation) and that is clearly documented.
The point they (I am guessing here) that having the passwords is
dangerous in insecure and yes it is.
The point
17 matches
Mail list logo