I agree you need a RACF ID and password an of course a list of permits. Which as was pointed that batch submission can be prevented by the permits no being there. Secondly, I find an article of this type irresponsible.
Scott ford www.identityforge.com from my IPAD 'Infinite wisdom through infinite means' On May 19, 2013, at 1:57 PM, Bill Godfrey <yak36...@yahoo.com> wrote: > In the Python script that a link in that site points to, I see that one line, > 525, is over 202000 bytes long, assigning a string literal about that long to > a variable. I couldn't help but reflect that some text editors and viewers > would have trouble with that line. Python does allow string literals to be > split and continued on separate lines. > > Bill > > On Sat, 18 May 2013 15:17:22 -0500, John McKown wrote: > >> http://mainframed767.tumblr.com/post/50574743147/big-iron-back-door-maintp-part-two >> >> basically the person must be able to ftp into a UNIX subdirectory and >> to submit a job. They upload a program called "netcat" into a data set >> starting with their RACF id. They then submit a job which copies the >> data set into the /tmp subdirectory with a "random" name, chmod the >> name to be executable, then executes does starts the netcat in the >> "background" (asynchronous to the batch job) and piping to/from the >> z/OS UNIX shell. The "hacker" simply connects to the port that netcat >> is listening on, and presto, they have a shell on their desktop. > > ---------------------------------------------------------------------- > For IBM-MAIN subscribe / signoff / archive access instructions, > send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN ---------------------------------------------------------------------- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN