Stream: Enterprise Security
Time: 13:00 - 14:00
In this session, Jim will present on the topic of cracking RACF passwords. He will talk about how someone would go about doing this including what tools are out there, how to crack passwords and how long it takes to crack passwords of differing lengths and complexities. Jim will also share his ideas and suggestions on the best way to defend your organisation and yourself against this, with good password practices and tools.
Jim has worked in mainframe security for around 17 years and has a keen interest in poking and prodding at things to see what happens (or breaks). He has developed a handful of his own RACF pen-testing utilities and collaborated with the "infamous" Soldier of Fortran on some others.
Jim has worked in mainframe security for around 17 years and has a keen interest in poking and prodding at things to see what happens (or breaks). He has developed a handful of his own RACF pen-testing utilities and collaborated with the "infamous" Soldier of Fortran on some others.
Jim has worked in mainframe security for around 17 years and has a keen interest in poking and prodding at things to see what happens (or breaks). He has developed a handful of his own RACF pen-testing utilities and collaborated with the "infamous" Soldier of Fortran on some others.
Jim has worked in mainframe security for around 17 years and has a keen interest in poking and prodding at things to see what happens (or breaks). He has developed a handful of his own RACF pen-testing utilities and collaborated with the "infamous" Soldier of Fortran on some others.
Jim has worked in mainframe security for around 17 years and has a keen interest in poking and prodding at things to see what happens (or breaks). He has developed a handful of his own RACF pen-testing utilities and collaborated with the "infamous" Soldier of Fortran on some others.
Jim has worked in mainframe security for around 17 years and has a keen interest in poking and prodding at things to see what happens (or breaks). He has developed a handful of his own RACF pen-testing utilities and collaborated with the "infamous" Soldier of Fortran on some others.
Jim has worked in mainframe security for around 17 years and has a keen interest in poking and prodding at things to see what happens (or breaks). He has developed a handful of his own RACF pen-testing utilities and collaborated with the "infamous" Soldier of Fortran on some others.
Jim has worked in mainframe security for around 17 years and has a keen interest in poking and prodding at things to see what happens (or breaks). He has developed a handful of his own RACF pen-testing utilities and collaborated with the "infamous" Soldier of Fortran on some others.
Jim has worked in mainframe security for around 17 years and has a keen interest in poking and prodding at things to see what happens (or breaks). He has developed a handful of his own RACF pen-testing utilities and collaborated with the "infamous" Soldier of Fortran on some others.
Click here to give some Feedback so we can make it even better next year!