Close

Embrace the dark side - Cracking RACF passwords

(FP)

Stream: Enterprise Security
Time: 13:00 - 14:00


Presentation

In this session, Jim will present on the topic of cracking RACF passwords. He will talk about how someone would go about doing this including what tools are out there, how to crack passwords and how long it takes to crack passwords of differing lengths and complexities. Jim will also share his ideas and suggestions on the best way to defend your organisation and yourself against this, with good password practices and tools.

Attachments

There is currently no attachment for Embrace the dark side - Cracking RACF passwords

Speakers


  • Jim Taylor at ?
  • Jim has worked in mainframe security for around 17 years and has a keen interest in poking and prodding at things to see what happens (or breaks). He has developed a handful of his own RACF pen-testing utilities and collaborated with the "infamous" Soldier of Fortran on some others.


    Email: jim@racf.guru

  • Jim Taylor at ?
  • Jim has worked in mainframe security for around 17 years and has a keen interest in poking and prodding at things to see what happens (or breaks). He has developed a handful of his own RACF pen-testing utilities and collaborated with the "infamous" Soldier of Fortran on some others.


    Email: jim@racf.guru

  • Jim Taylor at ?
  • Jim has worked in mainframe security for around 17 years and has a keen interest in poking and prodding at things to see what happens (or breaks). He has developed a handful of his own RACF pen-testing utilities and collaborated with the "infamous" Soldier of Fortran on some others.


    Email: jim@racf.guru

  • Jim Taylor at ?
  • Jim has worked in mainframe security for around 17 years and has a keen interest in poking and prodding at things to see what happens (or breaks). He has developed a handful of his own RACF pen-testing utilities and collaborated with the "infamous" Soldier of Fortran on some others.


    Email: jim@racf.guru

  • Jim Taylor at ?
  • Jim has worked in mainframe security for around 17 years and has a keen interest in poking and prodding at things to see what happens (or breaks). He has developed a handful of his own RACF pen-testing utilities and collaborated with the "infamous" Soldier of Fortran on some others.


    Email: jim@racf.guru

  • Jim Taylor at ?
  • Jim has worked in mainframe security for around 17 years and has a keen interest in poking and prodding at things to see what happens (or breaks). He has developed a handful of his own RACF pen-testing utilities and collaborated with the "infamous" Soldier of Fortran on some others.


    Email: jim@racf.guru

  • Jim Taylor at ?
  • Jim has worked in mainframe security for around 17 years and has a keen interest in poking and prodding at things to see what happens (or breaks). He has developed a handful of his own RACF pen-testing utilities and collaborated with the "infamous" Soldier of Fortran on some others.


    Email: jim@racf.guru

  • Jim Taylor at ?
  • Jim has worked in mainframe security for around 17 years and has a keen interest in poking and prodding at things to see what happens (or breaks). He has developed a handful of his own RACF pen-testing utilities and collaborated with the "infamous" Soldier of Fortran on some others.


    Email: jim@racf.guru

  • Jim Taylor at ?
  • Jim has worked in mainframe security for around 17 years and has a keen interest in poking and prodding at things to see what happens (or breaks). He has developed a handful of his own RACF pen-testing utilities and collaborated with the "infamous" Soldier of Fortran on some others.


    Email: jim@racf.guru

    Feedback

    Click here to give some Feedback so we can make it even better next year!