I agree you need a RACF ID and password an of course a list of permits. Which 
as was pointed that batch submission can be prevented by the permits no being 
there. Secondly, I find an article of this type irresponsible. 

Scott ford
www.identityforge.com
from my IPAD

'Infinite wisdom through infinite means'


On May 19, 2013, at 1:57 PM, Bill Godfrey <yak36...@yahoo.com> wrote:

> In the Python script that a link in that site points to, I see that one line, 
> 525, is over 202000 bytes long, assigning a string literal about that long to 
> a variable. I couldn't help but reflect that some text editors and viewers 
> would have trouble with that line. Python does allow string literals to be 
> split and continued on separate lines.
> 
> Bill
> 
> On Sat, 18 May 2013 15:17:22 -0500, John McKown wrote:
> 
>> http://mainframed767.tumblr.com/post/50574743147/big-iron-back-door-maintp-part-two
>> 
>> basically the person must be able to ftp into a UNIX subdirectory and
>> to submit a job. They upload a program called "netcat" into a data set
>> starting with their RACF id. They then submit a job which copies the
>> data set into the /tmp subdirectory with a "random" name, chmod the
>> name to be executable, then executes does starts the netcat in the
>> "background" (asynchronous to the batch job) and piping to/from the
>> z/OS UNIX shell. The "hacker" simply connects to the port that netcat
>> is listening on, and presto, they have a shell on their desktop.
> 
> ----------------------------------------------------------------------
> For IBM-MAIN subscribe / signoff / archive access instructions,
> send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN

Reply via email to