Latest articles

Article Image
IBM AS/400 - Setup Telnet 5250 Server
The IBM AS/400 Telnet server provides 5250 terminal access over TCP/IP. In this article, we will see how to configure and enable the Telnet 5250 service on an AS/400 running OS/400 V4R4.
Article Image
IBM AS/400 - Setup Telnet 5250 Server
The IBM AS/400 Telnet server provides 5250 terminal access over TCP/IP. In this article, we will see how to configure and enable the Telnet 5250 service on an AS/400 running OS/400 V4R4.
Article Image
IBM AS/400 - TCP/IP Setup
In order to be able to use the TCP / IP interfaces of the IBM AS / 400, they must be configured. In this article, we will see how to enable and configure the TCP / IP service to access the local network through Ethernet.
Article Image
Analysis and repair of an IBM Model M keyboard
Complete analysis and restoration of a 1990s mechanical IBM Model M keyboard, an iconic model known for its manufacturing quality and unique buckling spring mechanism.
Article Image
Parsing the msDS-KeyCredentialLink value for ShadowCredentials attack
In-depth explanation of the msDS-KeyCredentialLink attribute used in a shadow credentials attack, and how to parse it.
Article Image
Windows debugging - Analyzing a BSOD crash dump
Learn how to analyze a BSOD crash dump on Windows to understand what happens during a system crash and how to troubleshoot effectively.


All the tags


Intro (14) Fcsc (14) Exploit (10) Ibm (7) Windows (7) As400 (7) Iot (7) Dvid (7) Cve (6) Python (5) Reverse-Shell (5) Firmware (5) Ssti (4) Hardware (4) Jinja2 (4) Root (4) Forensics (4) Template (3) Conferences (3) Vulnerabilities (3) Ldap (3) Jinja (3) Contexte (3) Side (3) Active-Directory (3) Independant (3) Injection (3) Rce (3) Network (3) Server (3) Code (3) Press (3) Execution (3) Secretsdump (2) 5250 (2) Password (2) Telnet (2) Restoration (2) Pwn (2) Crypto (2) Keyboard (2) Recovery (2) Optimization (2) Publications (2) Infowindow (2) Heroctf (2) Poc (2) Cheatsheet (2) Mainframe (2) Secrets (2) Lsa (2) Data-Leak (1) Lighttpd (1) Writeup (1) Hardening (1) Remote-Code-Execution (1) Remotemouse (1) Forwarding (1) Payloads (1) Policy (1) Unauthenticated (1) Setuid (1) GiTea (1) RSAKeyMaterial (1) Service (1) Shadow (1) Xss (1) Lighttpd1.4 (1) Search-Api (1) Research (1) String (1) Ametys (1) Disclosure (1) Extraction (1) Pentesting (1) Depth-First-Search (1) Grehack (1) Web (1) Api (1) Privilege-Escalation (1) Authenticated (1) Database (1) Debugging (1) Infinite (1) Passwords (1) Spawn (1) Ipl (1) Shellcodes (1) Credentials (1) Qemu (1) Radio (1) Unix (1) Cms (1) Content (1) Format (1) Microsoft (1) Scrapping (1) Web-Application (1) Information (1) File-Read (1) MsDS-KeyCredentialLink (1) Devops (1) Rights (1) Ssh (1) Port (1) Shell (1) Crash-Dump (1) Dos (1) Enumeration (1) Adminer (1) Ctf (1) Denial (1) Box (1) Wget (1) Group (1) MicroFocus (1) Reverse Engineering (1) DNwithBinary (1) Print-Spooler (1) C (1) Of (1) Curl (1) Malloc (1) Linkedin (1) Suid (1) Tty (1) Web-Security (1) Reverse (1) Attribute (1)