Re: Hacking AS400

From: John Kinsella (jlk@thrashyour.com)
Date: Thu Apr 06 2006 - 03:03:11 EDT


On Wed, Apr 05, 2006 at 09:30:32AM -0000, culdud@gmail.com wrote:
> Have anyone of u is able to hack into iSeries AS/400 ?
>
> Recently during pentest I found following ports open on one of AS400 box:
> 21, 23, 449, 8476, 8470, 8472, 8471, 8475, 8473, 8474
>
> I have gathered necessary infromation about these ports. Is there any way by
> which we can use these ports to get into this box?

You're dealing with a completeley different beast. :) I have tons of
respect for the AS400 architecture - security model is very well done, but
as usual that's only as good in the real world as those maintaining it.

Looks like a pretty minumal config, no IFS or tomcat or sillyness,
just terminal server, ftp, and telnet. If you can sniff that network
segment for a while and you'll probably get a few useful passwords.
Seems like so few '400 system operators want to install ssh services...

Suggested reading: Expert's Guide to OS/400 & i5/OS Security
http://www.amazon.com/gp/product/158304096X/sr=8-3/qid=1144306627/ref=sr_1_3/104-8305370-1071915?%5Fencoding=UTF8

John

------------------------------------------------------------------------------
This List Sponsored by: Cenzic

Concerned about Web Application Security?
Why not go with the #1 solution - Cenzic, the only one to win the Analyst's
Choice Award from eWeek. As attacks through web applications continue to rise,
you need to proactively protect your applications from hackers. Cenzic has the
most comprehensive solutions to meet your application security penetration
testing and vulnerability management needs. You have an option to go with a
managed service (Cenzic ClickToSecure) or an enterprise software
(Cenzic Hailstorm). Download FREE whitepaper on how a managed service can
help you: http://www.cenzic.com/news_events/wpappsec.php
And, now for a limited time we can do a FREE audit for you to confirm your
results from other product. Contact us at request@cenzic.com for details.
------------------------------------------------------------------------------



This archive was generated by hypermail 2.1.7 : Sat Apr 12 2008 - 10:55:48 EDT