×
The internal search function is temporarily non-functional. The current search engine is no longer viable and we are researching alternatives.
As a stop gap measure, we are using Google's custom search engine service.
If you know of an easy to use, open source, search engine ... please contact support@midrange.com.
midrange-l-request@xxxxxxxxxxxx wrote:
9. RE: Research Project- If you wanted to Hack an AS/400
theoretical ly, what would you do? (NFM) (rob@xxxxxxxxx)
There are some manuals to start with.
"Tips and tools for securing your iSeries"
http://publib.boulder.ibm.com/iseries/v5r2/ic2924/books/c4153006.pdf
Rob's first manual is probably the best place to start. By describing
particular items to pay attention to while securing the system, the
common avenues of attack are also implicitly listed. I was very
irritated when IBM started putting manuals such as this on the web
because of that. But it's out there now, so might as well know it
thoroughly.
After this manual, a lot of decent TCP/IP-related attack info is also
potentially applicable since TCP/IP and the common server applications
-- e.g., telnet, FTP -- are standard. Further, because AS/400s often
participate in Windows Network Neighborhood, some Windows network
avenues are possible.
Al mentioned QSECOFR/QSECOFR which is embarassingly common. But
especially on older systems, a profile such as QSRVBAS was often ignored
entirely. That brings a new slant to the search by highlighting the
importance of keeping current with OS/400.
Because of the range of services possible under OS/400, the range of
attack avenues is pretty big. Start at the beginning; you've got a ways
to go.
Tom Liotta
--
Tom Liotta
The PowerTech Group, Inc.
19426 68th Avenue South
Kent, WA 98032
Phone 253-872-7788 x313
Fax 253-872-7904
http://www.powertech.com
As an Amazon Associate we earn from qualifying purchases.
This mailing list archive is Copyright 1997-2025 by midrange.com and David Gibbs as a compilation work. Use of the archive is restricted to research of a business or technical nature. Any other uses are prohibited. Full details are available on our policy page. If you have questions about this, please contact
[javascript protected email address].
Operating expenses for this site are earned using the Amazon Associate program and Google Adsense.