If you are interested in mainframes or merely curious to see a what a shell looks like on MVS, you're welcome to tag along.
Ayoul3 Ayoub is a pentester working for Wavestone, a consulting firm based in France.
James Langevin (1, 2) David Latimer Michael Leibowitz Nick Leiserson Yves Le Provost Jun Li Xiangyu Liu M Jerod Mac Donald-Evoy Andrew Mac Pherson Caleb Madrigal Dhia Mahjoub Slava Makkaveev Major Malfunction Dennis Maldonado Malware Unicorn Manfred (@_EBFE) Thomas Mathew Andrea Matwyshyn Vasilios Mavroudis Maximus64 Michael C.
Mc Neil Terrell Mc Sweeny (1, 2) Jon Medina Salvador Mendoza Whitney Merrill Sean Metcalf Jesse Michael Oleksandr Mirosh Ben Morris Alvaro Muñoz Myles N Marc Newlin (1, 2) Niki7a Jim Nitterauer O Kurt Opsahl "Snide" Owen P p3n3troot0r Dan "Alt F4" Petro Josh Pitts Plore Professor Plum Q Chris Quartier Cooper Quintin R Jay Radcliffe Michael T.
By using programmable logic chips, called Field Programmable Gate Arrays, this device is more open source than any common personal computing system to date.
No blobs, no hidden firmware features, and no secret closed source processors.
However, below the surface of open source operating systems, strictly closed source firmware along with device driver blobs and closed system architecture prevent users from examining, understanding, and trusting the systems where they run their private computations.
Embedded technologies like Intel Management Engine pose significant threats when, not if, they get exploited.
The rise of Free and Open Source Software has led to more secure and heavily scrutinized cryptographic solutions.Saturday at in Track 4 20 minutes | Demo Much of next-gen AV relies on machine learning to generalize to never-before-seen malware.Less well appreciated, however, is that machine learning can be susceptible to attack by, ironically, other machine learning models.Be it a wire transfer, an ATM withdrawal, or a flight booking, you can be sure that you've used the trusted services of a Mainframe at least once during the last 24 hours.In this talk, I will present methods of privilege escalation on IBM z/OS: How to leverage a simple access to achieve total control over the machine and impersonate other users.