Please register to access this VAP video:

      | mins

    In this demo we are exploiting vulnerabilities that were found in a program running in z/OS.

    This program could be running on your system.  We are going to bypass the security controls put in place by the installation and z/OS, to access protected resources that we do not have access to. In this video we will demonstrate that the user does not have access to the resource.  Then we will execute a script we have written in a common scripting language. Once the script is running it will take advantage of multiple vulnerabilities to bypass the controls that the organization put in place.