Penetration Testing mailing list archives

Re: Hacking AS400


From: Lucien Fransman <lucien.fransman () irc2 nl>
Date: Fri, 7 Apr 2006 16:48:19 +0200

On Thursday 06 April 2006 09:03, John Kinsella wrote:

Hello,

There are ways to get information from the ports you mention (like trying to 
log in with different usernames, and notice the response), sniffing network 
traffic, using FTP to get/access user accounts (notice, if you have a 
username/password for ftp, you can execute commands through ftp as that 
user).

The AS/400 security model allows for a very tight lockdown of the system, but 
some services (namely FTP and the databases) are insecure by design (if you 
have an account, you can escalate through these services.)

The services behind the ports can be found through some easy googling, and the 
high ports are described in the following location:

http://www-912.ibm.com/n_dir/nas4apar.NSF/c79815e083182fec862564c00079d117/fcc664db54c4c549862568720047b5fd?OpenDocument&Highlight=2,ii12227

I wont go into too much detail on how to exploit this machine, as i'm not very 
certain you are a qualified person for this. (Don't get me wrong, but i've 
seen too many "0wn3d" as/400 servers)


Kind Regards,

Enchanter_tim

 
On Wed, Apr 05, 2006 at 09:30:32AM -0000, culdud () gmail com wrote:
Have anyone of u is able to hack into iSeries AS/400 ?

Recently during pentest I found following ports open on one of AS400 box:
21, 23, 449, 8476, 8470, 8472, 8471, 8475, 8473, 8474

I have gathered necessary infromation about these ports. Is there any way
by which we can use these ports to get into this box?

You're dealing with a completeley different beast. :) I have tons of
respect for the AS400 architecture - security model is very well done, but
as usual that's only as good in the real world as those maintaining it.

Looks like a pretty minumal config, no IFS or tomcat or sillyness,
just terminal server, ftp, and telnet.  If you can sniff that network
segment for a while and you'll probably get a few useful passwords.
Seems like so few '400 system operators want to install ssh services...

Suggested reading: Expert's Guide to OS/400 & i5/OS Security
http://www.amazon.com/gp/product/158304096X/sr=8-3/qid=1144306627/ref=sr_1_
3/104-8305370-1071915?%5Fencoding=UTF8

John
snipsnip

------------------------------------------------------------------------------
This List Sponsored by: Cenzic

Concerned about Web Application Security? 
Why not go with the #1 solution - Cenzic, the only one to win the Analyst's 
Choice Award from eWeek. As attacks through web applications continue to rise, 
you need to proactively protect your applications from hackers. Cenzic has the 
most comprehensive solutions to meet your application security penetration 
testing and vulnerability management needs. You have an option to go with a 
managed service (Cenzic ClickToSecure) or an enterprise software 
(Cenzic Hailstorm). Download FREE whitepaper on how a managed service can 
help you: http://www.cenzic.com/news_events/wpappsec.php 
And, now for a limited time we can do a FREE audit for you to confirm your 
results from other product. Contact us at request () cenzic com for details.
------------------------------------------------------------------------------


Current thread: