Because we can!| Silent Signal Techblog
I was in a meeting with a client earlier today – they were discussing hardware changes, software version control, promotion flow and how to set it up. A mix of folks in attendance; one software developer and a host of vocal application managers confused by software lifecycle tracking, with limited IBM i expertise, but wanting […]| Nick Litten [IBM i AS400 iSeries] Software Developer
I’ve spent decades wrangling RPG code on AS400, iSERIES and IBM i systems. You know the drill: endless source files, green screens, and that nagging pull to modernize without breaking everything. Very repetetive and prone to broken code because of a finger slip, a mistyped line of code or a fat-finger moment on the keyboard. […]| Nick Litten [IBM i AS400 iSeries] Software Developer
In the ever-evolving world of programming, some languages stand the test of time by blending reliability with innovation. RPGLE (RPG for ILE, or Integrated| Nick Litten [IBM i AS400 iSeries] Software Developer
Intro| Silent Signal Techblog
Preface| Silent Signal Techblog
Preface| Silent Signal Techblog
Post-exploitation is a crucial element of any attack aiming for realistic objectives, so it is no surprise that the topic is extensively researched, resulting in a trove of information that defenders can rely on to design and implement countermeasures. Unfortunately, owners of IBM i systems do not have the luxury of access to such information right now. This was one of the main ideas we discussed with Ben Williams of Chilli IT, who was kind enough to introduce us to IBM’s Brunch and Learn w...| Silent Signal Techblog
In our first blog post of 2023, we continue our series about penetration testing IBM i. This time we look into how the so-called Adopted Authority mechanism can be abused for privilege escalation if privileged scripts are not implemented with enough care.| Silent Signal Techblog
When you get the chance to take a look at the IT systems of financial institutions, telcos, and other big companies, where availability has been a key business concern for decades, you’ll find, that some critical operations run through some obscure systems, in many cases accessed via nostalgic green-on-black terminals, the intricacies of which only a few people inside the company truly know. These systems might be IBM i’s – or as many senior folks know, “AS/400” or “iSeries” –...| Silent Signal Techblog