Gaps in Your Defense: Hacking the Mainframe

39
World ® ’1 6 Gaps in Your Defense: Hacking the Mainframe Philip Young - Co-Founder - ZedSec 390 MFT175S MAINFRAME AND WORKLOAD AUTOMATION

Transcript of Gaps in Your Defense: Hacking the Mainframe

Page 1: Gaps in Your Defense: Hacking the Mainframe

World®’16

GapsinYourDefense:HackingtheMainframePhilipYoung- Co-Founder- ZedSec 390

MFT175S

MAINFRAMEANDWORKLOADAUTOMATION

Page 2: Gaps in Your Defense: Hacking the Mainframe

2 ©2016CA.ALLRIGHTSRESERVED.@CAWORLD#CAWORLD

©2016CA.Allrightsreserved.Alltrademarksreferencedhereinbelongtotheirrespectivecompanies.

Thecontentprovidedinthis CAWorld2016presentationisintendedforinformationalpurposesonlyanddoesnotformanytypeofwarranty. The informationprovidedbyaCApartnerand/orCAcustomerhasnotbeenreviewedforaccuracybyCA.

ForInformationalPurposesOnlyTermsofthisPresentation

Page 3: Gaps in Your Defense: Hacking the Mainframe

3 ©2016CA.ALLRIGHTSRESERVED.@CAWORLD#CAWORLD

Abstract

Themainframeisthemission-essentialbackboneoftheenterprise,housingover70percentofcorporatedata,touchingmorethanhalfofallapplications,andconnectingtotheinternetandInternetofThings(IoT)throughAPIs.However,intheenterprisesecuritydiscussion,themainframeisoftenpresumedtobeinherentlysecure.Thissessionwilldiveintothecurrentstateofmainframeofmainframehacking,whyhackersaretakingalargerinterestintheplatform,adiscussionofcomplianceversussecurityandnextstepsonhowyoucanoptimizethesecurityofyourmostmission-essentialbusinessasset.

PhilipYoungZedSec 390Co-Founder

Page 4: Gaps in Your Defense: Hacking the Mainframe

4 ©2016CA.ALLRIGHTSRESERVED.@CAWORLD#CAWORLD

Disclaimer

I’mnothereinthenameoforonbehalfofmyemployer.Allopinionsexpressedherearemyown.

PhilipYoungZedSec 390Co-Founder

Page 5: Gaps in Your Defense: Hacking the Mainframe

5 ©2016CA.ALLRIGHTSRESERVED.@CAWORLD#CAWORLD

Page 6: Gaps in Your Defense: Hacking the Mainframe

6 ©2016CA.ALLRIGHTSRESERVED.@CAWORLD#CAWORLD

Page 7: Gaps in Your Defense: Hacking the Mainframe

7 ©2016CA.ALLRIGHTSRESERVED.@CAWORLD#CAWORLD

Page 8: Gaps in Your Defense: Hacking the Mainframe

8 ©2016CA.ALLRIGHTSRESERVED.@CAWORLD#CAWORLD

Page 9: Gaps in Your Defense: Hacking the Mainframe

9 ©2016CA.ALLRIGHTSRESERVED.@CAWORLD#CAWORLD

Page 10: Gaps in Your Defense: Hacking the Mainframe

10 ©2016CA.ALLRIGHTSRESERVED.@CAWORLD#CAWORLD

Page 11: Gaps in Your Defense: Hacking the Mainframe

11 ©2016CA.ALLRIGHTSRESERVED.@CAWORLD#CAWORLDLogica SecurityIncidentInvestigation:Bilaga_A.pdfSource:https://wikileaks.org/gottfrid-docs/

Page 12: Gaps in Your Defense: Hacking the Mainframe

12 ©2016CA.ALLRIGHTSRESERVED.@CAWORLD#CAWORLDCastleWallsUnderDigitalSiege:Risk-basedSecurityforz/OS– CAWorld‘15Source:https://www.youtube.com/watch?v=CySiZOaY2T0

Page 13: Gaps in Your Defense: Hacking the Mainframe

13 ©2016CA.ALLRIGHTSRESERVED.@CAWORLD#CAWORLD

CommonMyths

IT’SNOTONTHEINTERNET

IT’SIMPENETRABLE

HACKERSDON’TKNOWABOUTITHACKERSDON’TKNOWABOUTIT

BUTWE’REAUDITEDALLOFTHETIME

Page 14: Gaps in Your Defense: Hacking the Mainframe

14 ©2016CA.ALLRIGHTSRESERVED.@CAWORLD#CAWORLD

The‘IMP’

§ Startedin2013

§ Tools:– MassScan– Nmap– Python– X3270– LinuxVPS

§ Databaseof400+mainframes

https://mainframesproject.tumblr.com/

InternetMainframesProject

Page 15: Gaps in Your Defense: Hacking the Mainframe

15 ©2016CA.ALLRIGHTSRESERVED.@CAWORLD#CAWORLD

Page 16: Gaps in Your Defense: Hacking the Mainframe

16 ©2016CA.ALLRIGHTSRESERVED.@CAWORLD#CAWORLD

Page 17: Gaps in Your Defense: Hacking the Mainframe

17 ©2016CA.ALLRIGHTSRESERVED.@CAWORLD#CAWORLD

Page 18: Gaps in Your Defense: Hacking the Mainframe

18 ©2016CA.ALLRIGHTSRESERVED.@CAWORLD#CAWORLD

Page 19: Gaps in Your Defense: Hacking the Mainframe

19 ©2016CA.ALLRIGHTSRESERVED.@CAWORLD#CAWORLD

ItDoesn’tMatter

Page 20: Gaps in Your Defense: Hacking the Mainframe

20 ©2016CA.ALLRIGHTSRESERVED.@CAWORLD#CAWORLD

EnterprisesareFlat

§ Manylargeenterprisesexperiencedabreachin2015

§ Flatnetworks

§ Nofirewallbetween“Corporate”networkandmainframe

Page 21: Gaps in Your Defense: Hacking the Mainframe

21 ©2016CA.ALLRIGHTSRESERVED.@CAWORLD#CAWORLD

HackingtheUnhackable

§ Fromthenetwork

§ Noknowledgeofthesystem

§ Steps– Gatherinformation– Profilethesystem– Launchattacks

Toolsreleased/updatedin2015/2016

Page 22: Gaps in Your Defense: Hacking the Mainframe

22 ©2016CA.ALLRIGHTSRESERVED.@CAWORLD#CAWORLD

Nmap in2015/2016

•Anon?•SITE?•OSVersion?

• Information•VTAM?•CICS?•TSO?

•Version?•Nikto?•BURP?•Enumerate?• JavaObjects

Page 23: Gaps in Your Defense: Hacking the Mainframe

23 ©2016CA.ALLRIGHTSRESERVED.@CAWORLD#CAWORLD

TN3270Screen

Page 24: Gaps in Your Defense: Hacking the Mainframe

24 ©2016CA.ALLRIGHTSRESERVED.@CAWORLD#CAWORLD

VTAMEnumeration

Page 25: Gaps in Your Defense: Hacking the Mainframe

25 ©2016CA.ALLRIGHTSRESERVED.@CAWORLD#CAWORLD

TSOUserEnumeration

Page 26: Gaps in Your Defense: Hacking the Mainframe

26 ©2016CA.ALLRIGHTSRESERVED.@CAWORLD#CAWORLD

Page 27: Gaps in Your Defense: Hacking the Mainframe

27 ©2016CA.ALLRIGHTSRESERVED.@CAWORLD#CAWORLD

CICSTransactionEnumeration

Page 28: Gaps in Your Defense: Hacking the Mainframe

28 ©2016CA.ALLRIGHTSRESERVED.@CAWORLD#CAWORLD

Removed

Removed

Removed

Page 29: Gaps in Your Defense: Hacking the Mainframe

29 ©2016CA.ALLRIGHTSRESERVED.@CAWORLD#CAWORLD

CICSpwn

Page 30: Gaps in Your Defense: Hacking the Mainframe

30 ©2016CA.ALLRIGHTSRESERVED.@CAWORLD#CAWORLD

CICSpwn:TSOShell

Page 31: Gaps in Your Defense: Hacking the Mainframe

31 ©2016CA.ALLRIGHTSRESERVED.@CAWORLD#CAWORLD

CICSpwn:TSOShell

Page 32: Gaps in Your Defense: Hacking the Mainframe

32 ©2016CA.ALLRIGHTSRESERVED.@CAWORLD#CAWORLD

FTPAuthorizedCodeExec

Page 33: Gaps in Your Defense: Hacking the Mainframe

33 ©2016CA.ALLRIGHTSRESERVED.@CAWORLD#CAWORLD

WhatCanIDo?

§ Complianceisliterallythestart

§ Justbecauseyou’recompliantdoesn’tmean:– Thecompliancerulesarewelldone– Representcurrentthreats– Matchcurrentbaselines

§ VulnerabilityScanning?

Page 34: Gaps in Your Defense: Hacking the Mainframe

34 ©2016CA.ALLRIGHTSRESERVED.@CAWORLD#CAWORLD

GapAssessment

§ Compareyourrequirementstoastandard

§ Howdoyoucompareandcontrast?

§ Who’sexpertiseareyourelyingon?

Page 35: Gaps in Your Defense: Hacking the Mainframe

35 ©2016CA.ALLRIGHTSRESERVED.@CAWORLD#CAWORLD

GoBeyondCompliance

§ zAssure?

§ IdentifyingDataAssets?

§ LoggingandMonitoring?– zSecure– IronStream– Vanguard

§ PenetrationTesting?

Page 36: Gaps in Your Defense: Hacking the Mainframe

36 ©2016CA.ALLRIGHTSRESERVED.@CAWORLD#CAWORLD

CICSpwnhttps://github.com/ayoul3/cicspwn

Nmap Scriptshttps://github.com/zedsec390/NMAP

Metasploithttps://github.com/rapid7/metasploit-framework

Contact&ReferencesTwitter:@mainframed767E-Mail:[email protected]

Page 37: Gaps in Your Defense: Hacking the Mainframe

37 ©2016CA.ALLRIGHTSRESERVED.@CAWORLD#CAWORLD

Stayconnectedatcommunities.ca.com

Thankyou.

Page 38: Gaps in Your Defense: Hacking the Mainframe

38 ©2016CA.ALLRIGHTSRESERVED.@CAWORLD#CAWORLD

MustSeeDemos

Real-TimeDataSecurity&Compliance

CADataContentDiscoveryMainframeTheatre

MainframeSecuritySmartBar

CATopSecretMainframeTheatre

Real-TimeDataSecurity&Compliance

CAComplianceEventManagerMainframeTheatre

MainframeSecuritySmartBar

CAACF2MainframeTheatre

Page 39: Gaps in Your Defense: Hacking the Mainframe

39 ©2016CA.ALLRIGHTSRESERVED.@CAWORLD#CAWORLD

MainframeandWorkloadAutomation

FormoreinformationonMainframeandWorkloadAutomation,pleasevisit:http://cainc.to/9GQ2JI