Latest articles

Article Image
AS/400 Forensics: Retrieving your Licence Keys from disk images
A technical guide to forensic techniques for retrieving lost or forgotten licence keys from IBM AS/400 systems.
Article Image
Rescuing one of the first IBM AS/400, a 9406-B30 from 1988
How we rescued one of the earliest IBM AS/400 machines ever built, a 9406-B30 manufactured in July 1988, one month before the official announcement, from being scrapped for gold.
Article Image
IBM AS/400 - Setup Telnet 5250 Server
The IBM AS/400 Telnet server provides 5250 terminal access over TCP/IP. In this article, we will see how to configure and enable the Telnet 5250 service on an AS/400 running OS/400 V4R4.
Article Image
IBM AS/400 - Setup Telnet 5250 Server
The IBM AS/400 Telnet server provides 5250 terminal access over TCP/IP. In this article, we will see how to configure and enable the Telnet 5250 service on an AS/400 running OS/400 V4R4.
Article Image
IBM AS/400 - TCP/IP Setup
In order to be able to use the TCP / IP interfaces of the IBM AS / 400, they must be configured. In this article, we will see how to enable and configure the TCP / IP service to access the local network through Ethernet.
Article Image
BloodHound - Generating OpenGraphs in Python with bhopengraph
How I built bhopengraph, a Python library to generate valid BloodHound OpenGraph JSON files for custom data ingestion. Covers the OpenGraph schema, library design, practical examples, and lessons learned.


All the tags


Fcsc (14) Intro (14) Exploit (10) As400 (9) Ibm (9) Iot (7) Dvid (7) Windows (7) Cve (6) Python (6) Forensics (5) Reverse-Shell (5) Firmware (5) Hardware (5) Root (4) Mainframe (4) Ssti (4) Jinja2 (4) Jinja (3) Ldap (3) Network (3) Server (3) Template (3) Execution (3) Restoration (3) Side (3) Recovery (3) Active-Directory (3) Independant (3) Vulnerabilities (3) Code (3) Rce (3) Contexte (3) Injection (3) Keyboard (2) 5250 (2) Poc (2) Optimization (2) Press (2) Secrets (2) Password (2) Crypto (2) Lsa (2) Secretsdump (2) Pwn (2) Heroctf (2) Cheatsheet (2) Infowindow (2) Conferences (2) Telnet (2) Search-Api (1) Disclosure (1) Forwarding (1) Lighttpd1.4 (1) Unauthenticated (1) Cms (1) Hardening (1) Spawn (1) Web-Security (1) Content (1) Extraction (1) Graph (1) Setuid (1) Licence (1) Print-Spooler (1) Service (1) MsDS-KeyCredentialLink (1) Passwords (1) Port (1) Tooling (1) Shadow (1) Wget (1) Privilege-Escalation (1) Scrapping (1) Adminer (1) Enumeration (1) Xss (1) Radio (1) Web-Application (1) Depth-First-Search (1) Dos (1) Infinite (1) MicroFocus (1) Reverse Engineering (1) Attribute (1) Devops (1) Payloads (1) Denial (1) Curl (1) GiTea (1) Tty (1) Credentials (1) Format (1) Ametys (1) Database (1) Writeup (1) Rights (1) DNwithBinary (1) Linkedin (1) Suid (1) Api (1) Policy (1) File-Read (1) Lighttpd (1) Malloc (1) Research (1) RSAKeyMaterial (1) Web (1) Ctf (1) Debugging (1) Information (1) Ssh (1) Data-Leak (1) Ipl (1) Pentesting (1) C (1) Grehack (1) Group (1) Shellcodes (1) Qemu (1) Authenticated (1) Box (1) Reverse (1) Bloodhound (1) Keys (1) Of (1) Publications (1) Shell (1) Crash-Dump (1) Opengraph (1) Remote-Code-Execution (1) Unix (1) Microsoft (1) Remotemouse (1) String (1)