Are you responsible for security in your IT department?
Do you have iSeries or AS/400 servers on your network?
- Learn how to subvert PCs of users connecting to an iSeries server.
- See how your network can be scanned and attacked from an iSeries server.
- Learn how iSeries servers are used to clandestinely store malware and viruses.
Are a security consultant doing penetration tests?
Maybe you have to audit an environment containing AS/400 servers?
Enumerate AS/400 user accounts
Bypass iSeries security products
Run reverse shells from the AS/400 across the corporate firewall
Are you responsible for the administration of an iSeries?
Do you use an AS/400 for your legacy applications?
Learn of the multiple built-in tools that let you modify legacy data
Study how hackers plant booby traps, mines and Trojan horses in the system and in legacy applications.
See how rogue backdoor entry points can be started
Learn multiple methods to run remote commands on the iSeries.
Does your iSeries host a web application?
Does a web application use it for a database server?
Learn about problems with AS/400 specific web applications.
See SQL injection techniques specific to the iSeries platform.