YoVDO

Dealing the Perfect Hand - Shuffling Memory Blocks on Z/OS

Offered By: Black Hat via YouTube

Tags

Black Hat Courses Cybersecurity Courses Network Protocols Courses

Course Description

Overview

Embark on a journey to exploit one of the most secure platforms in existence - the Mainframe - in this 46-minute Black Hat conference talk. Explore network protocols, brute force techniques, and buffer overflow vulnerabilities as you delve into hacking Paris and manipulating memory blocks on z/OS. Learn about rack F list user control blocks, modset macros, and PF libraries. Discover the intricacies of weaponizing supervisor calls (SVCs) and utilizing SPC scripts for proof of concept. Examine the potential applications and limitations of the presented program, including an analysis of the Incognito script. Witness a live demonstration and gain valuable insights into advanced mainframe exploitation techniques.

Syllabus

Introduction
What are we gonna talk about
Network Protocols
Brute Force
Hacking Paris
Buffer Overflow
Rack F
List User
Control Blocks
ModSet Macro
Find PF Libraries
The Program
Weaponizing
Supervisor Calls
SVCs
SPC Script
Proof of Concept
Who will use it
Why I didnt like it
Incognito
Script
Demo
Summary


Taught by

Black Hat

Related Courses

Attack on Titan M, Reloaded - Vulnerability Research on a Modern Security Chip
Black Hat via YouTube
Attacks From a New Front Door in 4G & 5G Mobile Networks
Black Hat via YouTube
AAD Joined Machines - The New Lateral Movement
Black Hat via YouTube
Better Privacy Through Offense - How to Build a Privacy Red Team
Black Hat via YouTube
Whip the Whisperer - Simulating Side Channel Leakage
Black Hat via YouTube