Latest articles

Article Image
AS/400 Forensics: Retrieving your Licence Keys from disk images
A technical guide to forensic techniques for retrieving lost or forgotten licence keys from IBM AS/400 systems.
Article Image
Rescuing one of the first IBM AS/400, a 9406-B30 from 1988
How we rescued one of the earliest IBM AS/400 machines ever built, a 9406-B30 manufactured in July 1988, one month before the official announcement, from being scrapped for gold.
Article Image
IBM AS/400 - Setup Telnet 5250 Server
The IBM AS/400 Telnet server provides 5250 terminal access over TCP/IP. In this article, we will see how to configure and enable the Telnet 5250 service on an AS/400 running OS/400 V4R4.
Article Image
IBM AS/400 - Setup Telnet 5250 Server
The IBM AS/400 Telnet server provides 5250 terminal access over TCP/IP. In this article, we will see how to configure and enable the Telnet 5250 service on an AS/400 running OS/400 V4R4.
Article Image
IBM AS/400 - TCP/IP Setup
In order to be able to use the TCP / IP interfaces of the IBM AS / 400, they must be configured. In this article, we will see how to enable and configure the TCP / IP service to access the local network through Ethernet.
Article Image
Analysis and repair of an IBM Model M keyboard
Complete analysis and restoration of a 1990s mechanical IBM Model M keyboard, an iconic model known for its manufacturing quality and unique buckling spring mechanism.


All the tags


Intro (14) Fcsc (14) Exploit (10) Ibm (9) As400 (9) Windows (7) Iot (7) Dvid (7) Cve (6) Python (5) Hardware (5) Reverse-Shell (5) Forensics (5) Firmware (5) Root (4) Ssti (4) Mainframe (4) Jinja2 (4) Network (3) Independant (3) Recovery (3) Ldap (3) Contexte (3) Side (3) Restoration (3) Jinja (3) Press (3) Rce (3) Server (3) Conferences (3) Vulnerabilities (3) Active-Directory (3) Template (3) Execution (3) Injection (3) Code (3) Infowindow (2) Poc (2) Keyboard (2) Heroctf (2) Publications (2) Pwn (2) Password (2) Telnet (2) Lsa (2) Crypto (2) Cheatsheet (2) 5250 (2) Secretsdump (2) Optimization (2) Secrets (2) Print-Spooler (1) String (1) Web (1) Research (1) Web-Security (1) Denial (1) Pentesting (1) MicroFocus (1) Of (1) Remotemouse (1) Information (1) Radio (1) Forwarding (1) Ctf (1) Depth-First-Search (1) Authenticated (1) Licence (1) Curl (1) Passwords (1) Qemu (1) Reverse Engineering (1) Box (1) GiTea (1) Hardening (1) Ipl (1) Content (1) Linkedin (1) Port (1) Debugging (1) Malloc (1) Api (1) Infinite (1) Dos (1) Attribute (1) Privilege-Escalation (1) Reverse (1) Rights (1) Unauthenticated (1) Xss (1) Cms (1) Group (1) Microsoft (1) Policy (1) Suid (1) Ssh (1) Shadow (1) Ametys (1) Disclosure (1) File-Read (1) Shell (1) Writeup (1) C (1) Shellcodes (1) Grehack (1) Spawn (1) Devops (1) Data-Leak (1) Enumeration (1) Extraction (1) Payloads (1) RSAKeyMaterial (1) Search-Api (1) Tty (1) Crash-Dump (1) Remote-Code-Execution (1) Web-Application (1) Wget (1) Lighttpd (1) Setuid (1) Format (1) Unix (1) Credentials (1) MsDS-KeyCredentialLink (1) Scrapping (1) Service (1) Lighttpd1.4 (1) Database (1) DNwithBinary (1) Keys (1) Adminer (1)