> I have no idea how he got the addresses I suspect by scanning.
Charles -----Original Message----- From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] On Behalf Of Tony Harminc Sent: Monday, January 05, 2015 4:44 PM To: IBM-MAIN@LISTSERV.UA.EDU Subject: Re: Enumerating User IDs (was: CANCEL TSO Logon?) On 5 January 2015 at 19:19, Tony's Basement Computer <tbabo...@comcast.net> wrote: > Yep. BTW, how did Mr. Mainframehacker get to the TSO log on screen? Did > someone provide the magic VTAM command? I ask from ignorance because I > didn't watch 100% of the video and I'm not "connect literate." His (incredibly annoying if you're an old non-hip guy like me) tumblr page is chock full of GIFs of logon screens with their publicly reachable IP addresses. So anyone could just TN3270 to any of those. Even if they support TLS, that protects the data in transit, but it's unlikely that authentication by the TN3270 client is required. I have no idea how he got the addresses, and presumably some have been "fixed" by now, but doubtless not all. ---------------------------------------------------------------------- For IBM-MAIN subscribe / signoff / archive access instructions, send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN