We explain how mainframes work, potential attack vectors, and what to focus on when pentesting such systems.