Skip to content
KRI Security
KRI SecurityKRI Security
  • Solutions
    • Mainframe Code Vulnerabilities
    • Excessive Access on Mainframe
    • Mainframe Data Breaches
  • Products
    • z/ Assure Vulnerability Analysis Program
    • z/ Assure Compliance Assessment Manager
    • Mainframe Integrity Assessments
    • Compliance Risk Assessments
    • External Security Manager (ESM) Conversion Services
      • Security Product Conversion Services
      • Security Product Database Merges
      • Db2 to RACF® Security Conversions
  • Customers
  • Resources
    • Blog
  • About
    • Partners
  • Contact
Search:
  • Login
  • My KRI
Login
  • Solutions
    • Mainframe Code Vulnerabilities
    • Excessive Access on Mainframe
    • Mainframe Data Breaches
  • Products
    • z/ Assure Vulnerability Analysis Program
    • z/ Assure Compliance Assessment Manager
    • Mainframe Integrity Assessments
    • Compliance Risk Assessments
    • External Security Manager (ESM) Conversion Services
      • Security Product Conversion Services
      • Security Product Database Merges
      • Db2 to RACF® Security Conversions
  • Customers
  • Resources
    • Blog
  • About
    • Partners
  • Contact

Daily Archives: December 18, 2020

Hacking a Mainframe in Less than 30 Minutes

Threats and VulnerabilitiesBy Ray OverbyDecember 18, 2020

In this demo, we’ll exploit a vulnerability that was found in a program running in z/OS. This kind of program could be running on your system right now.

© 2021 Key Resources INC.
  • Sitemap
  • Privacy Policy
  • Terms & Conditions
  • Contact Us
  • Twitter
  • LinkedIn
Useful Links
Powered by AmericanEagle.com