No blobs, no hidden firmware features, and no secret closed source processors.This concept isn't "unhacakable", rather we believe it to be the most fixable; this is what users and hackers should ultimately be fighting for.Sean Kanuck (1, 2) Konstantinos Karagiannis Garry Kasparov Matt Knight William Knowles Artem Kondratenko Itzik Kotler Amit Klein L Logan Lamb Rep.James Langevin (1, 2) David Latimer Michael Leibowitz Nick Leiserson Yves Le Provost Jun Li Xiangyu Liu M Jerod Mac Donald-Evoy Andrew Mac Pherson Caleb Madrigal Dhia Mahjoub Slava Makkaveev Major Malfunction Dennis Maldonado Malware Unicorn Manfred (@_EBFE) Thomas Mathew Andrea Matwyshyn Vasilios Mavroudis Maximus64 Michael C.You start a BITS job, and from that point on, BITS is responsible for the download.
If you want to test some of the tools showcased during the talk, you can check out his tools: https://github.com/ayoul3/ @ayoul3__ Sunday at in Track 3 20 minutes | Demo, Tool Windows' BITS service is a middleman for your download jobs.
In this talk, I will present methods of privilege escalation on IBM z/OS: How to leverage a simple access to achieve total control over the machine and impersonate other users.
If you are interested in mainframes or merely curious to see a what a shell looks like on MVS, you're welcome to tag along.
0ctane 0ctane is a longtime hobbyist hacker, with experience primarily in UNIX systems and hardware.
Holding no official training or technical employment, 0ctane spends most of their free time building and restoring older computer systems, hanging out at surplus stores and tracking down X86 alternatives with an occasional dabbling in OSX and 802.11 exploitation.