In this demo we are exploiting vulnerabilities that were found in a program running in z/OS.
This program could be running on your system. We are going to bypass the security controls put in place by the installation and z/OS, to access protected resources that we do not have access to. In this video we will demonstrate that the user does not have access to the resource. Then we will execute a script we have written in a common scripting language. Once the script is running it will take advantage of multiple vulnerabilities to bypass the controls that the organization put in place.