Ready to Start Your Career?

[podcast] Pentesting and Defending a Mainframe and Mainframe Security

BrBr 's profile image

By: BrBr

February 24, 2016

[embed][/embed]This week's super-sized episode is brought to us thanks to previous guest Cheryl Biswas. You might remember her from our "Shadow IT" (http:/ podcast a few months ago. She reached out to us to see if we were interested in doing a podcast on mainframe security with her and a couple of gentlemen that were not unknown to us.Of course we jumped at the chance! You might know them as @mainframed767 (Philip) and @bigendiansmalls (Chad) on Twitter. They've been trying to get people to be looking into mainframes and#mainframe #security for years. Mainframes are usually used by financial organizations, or older organizations. In many cases, these systems are managed by a handful of people, and you will have little or no help if you are a red teamer or pentester to make sure these systems are as secured as they possibly can. And many blue team members rely on the 'uber-beardy' guy to understand how they even function.So, Cheryl (@3ncr1pt3d), @bigendiansmalls, and @mainframed767 (Philip) walk us through how a mainframe functions. We discuss what you might see when a scan occurs, that if runs a mainframe OS, and a Linux 'interface' OS.We also discuss methods you can use to protect your organization, and methods you can use as a redteamer to learn more about mainframes.Chad's talk at DerbyCon 2015: discussing mainframe Security on Hak5: for mainframes:'s talks on Youtube: Brian and I wish to thank Cheryl for all her help in making this happen. You can find her blog over at Alienvault's site... Stitcher Network: Radio App: Podcast Twitter:'s Twitter:'s Twitter: our Patreon!: FEED:, Questions, Feedback:**NEW** Google Play Store:**NEW** Listen to us on Player.FM!! : Direct Download:[caption id="" align="alignleft" width="644"] Visit us at[/caption]
Schedule Demo