Podalirius
All Articles
Writeups
Press and Conferences
CVEs
|
|
Latest articles
AS/400 Forensics: Retrieving your Licence Keys from disk images
December 15, 2025
A technical guide to forensic techniques for retrieving lost or forgotten licence keys from IBM AS/400 systems.
as400
forensics
ibm
keys
licence
mainframe
recovery
IBM AS/400 - Setup Telnet 5250 Server
September 10, 2025
The IBM AS/400 Telnet server provides 5250 terminal access over TCP/IP. In this article, we will see how to configure and enable the Telnet 5250 service on an AS/400 running OS/400 V4R4.
as400
ibm
network
telnet
5250
IBM AS/400 - Setup Telnet 5250 Server
September 10, 2025
The IBM AS/400 Telnet server provides 5250 terminal access over TCP/IP. In this article, we will see how to configure and enable the Telnet 5250 service on an AS/400 running OS/400 V4R4.
as400
ibm
network
telnet
5250
IBM AS/400 - TCP/IP Setup
September 7, 2025
In order to be able to use the TCP / IP interfaces of the IBM AS / 400, they must be configured. In this article, we will see how to enable and configure the TCP / IP service to access the local network through Ethernet.
as400
ibm
network
Analysis and repair of an IBM Model M keyboard
July 2, 2025
Complete analysis and restoration of a 1990s mechanical IBM Model M keyboard, an iconic model known for its manufacturing quality and unique buckling spring mechanism.
as400
hardware
ibm
infowindow
keyboard
mainframe
restoration
Parsing the msDS-KeyCredentialLink value for ShadowCredentials attack
January 18, 2025
In-depth explanation of the msDS-KeyCredentialLink attribute used in a shadow credentials attack, and how to parse it.
active-directory
attribute
credentials
DNwithBinary
ldap
msDS-KeyCredentialLink
research
RSAKeyMaterial
shadow
windows
All the tags
Intro (14)
Fcsc (14)
Exploit (10)
As400 (8)
Ibm (8)
Windows (7)
Iot (7)
Dvid (7)
Cve (6)
Firmware (5)
Reverse-Shell (5)
Python (5)
Forensics (5)
Jinja2 (4)
Ssti (4)
Root (4)
Hardware (4)
Ldap (3)
Injection (3)
Independant (3)
Contexte (3)
Network (3)
Execution (3)
Template (3)
Vulnerabilities (3)
Code (3)
Mainframe (3)
Jinja (3)
Recovery (3)
Active-Directory (3)
Rce (3)
Press (3)
Side (3)
Conferences (3)
Server (3)
Cheatsheet (2)
Lsa (2)
Poc (2)
Keyboard (2)
Crypto (2)
Telnet (2)
Publications (2)
Infowindow (2)
Restoration (2)
5250 (2)
Secrets (2)
Optimization (2)
Password (2)
Secretsdump (2)
Heroctf (2)
Pwn (2)
Linkedin (1)
Remotemouse (1)
Xss (1)
Keys (1)
Curl (1)
Lighttpd1.4 (1)
MsDS-KeyCredentialLink (1)
Research (1)
Web-Security (1)
Pentesting (1)
Remote-Code-Execution (1)
Authenticated (1)
Wget (1)
Attribute (1)
Reverse (1)
Setuid (1)
Debugging (1)
Privilege-Escalation (1)
Unix (1)
Ipl (1)
Grehack (1)
Radio (1)
Ctf (1)
Data-Leak (1)
File-Read (1)
Hardening (1)
Crash-Dump (1)
Spawn (1)
Payloads (1)
Format (1)
Rights (1)
Writeup (1)
Microsoft (1)
Tty (1)
Unauthenticated (1)
Shell (1)
Web (1)
Database (1)
DNwithBinary (1)
GiTea (1)
Information (1)
Web-Application (1)
Api (1)
Service (1)
Suid (1)
Credentials (1)
Ametys (1)
Malloc (1)
Depth-First-Search (1)
Of (1)
String (1)
Denial (1)
Devops (1)
Infinite (1)
Passwords (1)
Print-Spooler (1)
C (1)
Ssh (1)
Scrapping (1)
Adminer (1)
Content (1)
Forwarding (1)
Lighttpd (1)
RSAKeyMaterial (1)
Group (1)
Search-Api (1)
Shadow (1)
Extraction (1)
Dos (1)
MicroFocus (1)
Reverse Engineering (1)
Qemu (1)
Cms (1)
Disclosure (1)
Enumeration (1)
Policy (1)
Shellcodes (1)
Box (1)
Port (1)
Licence (1)