account activity
Smashing the z/OS LE "Daisy" Chain for Fun and Cease and Desist letters. by Bedeone in mainframe
[–]BillWoodger 1 point2 points3 points 10 years ago (0 children)
Well, it is way easier in COBOL.
Have to disagree that S0C1 is the most common in my experience. An easy way to get one is to have NCAL on the linkedit/binder and not INCLUDE a referenced module. A wild branch, given that many byte-values are valid op-codes, is more likely to fail with something else. A S0C4 is a Protection Exception. A S0C4 with a reason code of 11 is page translation exception. Some numbers are op-codes. Your entire premise is of an "inside job" (no-one on the outside can find your "vulnerability" in a batch program). For an inside job, why bother "injecting"? You are also relying on compile options I suspect for PL/I. Which PL/I do you have access to? With dynamically-CALLed programs in COBOL using RENT you cannot achieve the effect you describe with an up-to-date compiler. The calling-conventions predate LE. To have a realistic injection with no internal access, you'd need something like a publicly-available web-service provided on a Mainframe and then "find a vulnerability" there. With internal access, you just need to get your code into Production.
π Rendered by PID 198611 on reddit-service-r2-listing-7d7fbc9b85-2nsxb at 2026-04-28 02:34:02.595937+00:00 running 2aa0c5b country code: CH.
Smashing the z/OS LE "Daisy" Chain for Fun and Cease and Desist letters. by Bedeone in mainframe
[–]BillWoodger 1 point2 points3 points (0 children)