MacMusic  |  PcMusic  |  440 Software  |  440 Forums  |  440TV  |  Zicos
ibm
Recherche

Below MI – IBM i for hackers

lundi 1 juillet 2024, 21:39 , par OS News
In this writeup we provide a summary of technical information crucial to evaulate the exploitability and impact of memory safety problems in IBM i programs. As administrators and developers of IBM i aren’t supposed to work “below MI level” this kind of information is not officially documented by the vendor. The information presented here is thus based on already published reverse engineering results, and our own findings uncovered using IBM’s System Sertice Tools (SST) and the POWER-AS specific Processor extensions we developed for the Ghidra reverse engineering framework.

Tests were performed on a physical POWER 9 system running IBM i V7R4. Programs were compiled by the default settings of the system in the ILE program model. C language source code will be provided separately.
↫ Silent Signal

Some light reading.
https://www.osnews.com/story/140117/below-mi-ibm-i-for-hackers/

Voir aussi

News copyright owned by their original publishers | Copyright © 2004 - 2024 Zicos / 440Network
Date Actuelle
mar. 5 nov. - 11:54 CET