On 1/13/2018 3:24 PM, Fred Cisin via cctalk wrote:
(I'm unaware of any punch-card attacks, but trojans were possible when people used prior subroutines)
When I was using cards with our campus 360/50 MVT system and you could submit probably anything, a friend in EE (we were squatters in the CS area) had worked a summer job and had a really nice program they'd ran which now days would be called a text based football game.

All one had to do was stick a job card in front of a deck, and we submitted our own  jobs via a 2501 which was in the hall outside the computer room.  Users loaded and fed their own cards, so there was no restriction on when the job ran.

He decided to get a listing and figured if he stuck a job card in front if it and a couple of DD statements the job would blow up and he'd get a listing.

All of the I/O was with WTO and WTOR.  The operator that afternoon quickly discovered that WTOs were not disabled by the sysgen, and worse, there was only the single 1050 console, so the only way to get thru the job and get other things running was to play a game.

And even worse, if he took too long, a fun feature of MVT and not corrected in MVS was if a console channel went unavailable for too long, the system would crash.  Luckily the game would print out a line, and a blob of console messages would come out then ask for another move.

Took 10 minutes to lose a game.

The system administrators regenerated the system to add privilege and authorization to jobs using WTOR which they'd missed.

We found other fun holes like that in MVT.

When we were put over to a VS/1 system via TSO terminals, a console message monitor, and a password snarfing program was developed and ran quite a lot via remote access (system and terminals were in different cities).

That was all OS of course, and some of it was something that could be disabled by sysgen options.  The password snarfing was not.

thanks
Jim

Reply via email to