Stream: Security
Time: 15:15 - 16:00
This session is based on exposures we have commonly found during network security assessments.
The session will attempt to do a live demo of how a someone's TSO login password, even on an encrypted TN3270 session, can be extracted using an unauthorised batch job exploiting what we have found to be a very common exposure.
The session will go on to explain how it worked, similar exposures and the often forgotten/overlooked RACF defintions to prevent them.
Co-founder and Software Technical Director at Vertali.
46 years working with mainframes. Specialising in networking technologies and the design/development of systems software, especially program products associated with network communications, security and monitoring, several of which are still marketed by major software vendors.
Click here to give some Feedback so we can make it even better next year!