• The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
Menu
  • The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
  • Pen Tester Silent Signal Targets IBM i

    September 28, 2022 Alex Woodie

    If you’re in the market for penetration testing services, you might be interested in hearing about a relatively new player in the market named Silent Signal. The Budapest, Hungary-based outfit has been offering IBM i penetration testing for the past year, and it’s already found security vulnerabilities in its clients’ systems.

    Silent Signal has been providing penetration testing, IT security assessments, and training since it was founded by a trio of security experts in 2009. With around a dozen security certifications to their credits, the security experts are well versed in the standard methods companies use to block hackers and cybercriminals from compromising systems. By adding ethical hacking to the mix, Silent Signal looks for non-traditional routes to compromising systems.

    According to one of the co-founders, Balint Varga-Perke, the company made the decision to open an IBM i penetration testing specialty last year based on their experience with the booming sub-sector of security services.

    “We started the [IBM i] research in 2021, primarily motivated by our pen test project experience,” Varga-Perke tells IT Jungle. “While there are some materials out there about testing the security of these systems, when facing real targets we realized that we can get beyond those quickly just by looking at the official documentation. Since we strongly believe in systematic approaches when it comes to security testing, we decided to create our own IBM i lab and testing methodology.”

    The interest among IBM i shops was “immediate,” Varga-Perke says. The company was pleased at the interest in penetration testing services for IBM i, but they were not surprised.

    “Our projects focus on what our customers – the users of IBM i – can get wrong,” he says. “This mainly involves identifying configuration issues allowing unauthorized access to data either from the ‘outside’ or across legitimate users.”

    The IBM i is an enigma in some ways, as it combines excellent security protections in some respects but falls short in others. Specifically, Varga-Perke hailed the IBM i operating system’s object-oriented architecture, which he says provides “a strong foundation for security, because raw data can’t be accessed in arbitrary ways.”

    While this approach enables “a high granularity of access controls, too,” that functions as a double-edge sword.

    “Precise declaration of rules is always important, but at the same time, the complexity can make people cut corners,” he says. “We see exploitable vulnerabilities arising from this all the time.”

    When Silent Signal engages an IBM i penetration testing customer, the scope is always well-defined, which helps to minimize any risk involved “when using the systems in unexpected ways (which is basically what hacking is),” Varga-Perke says. “We don’t approach anyone saying ‘Hey, we found your green screen on the Internet and logged in with a weak password.’ We need authorization from the system owner to do anything.”

    During penetration testing, the company simulates malicious actors with different levels of initial access to the target systems, he says. The goal is typically to obtain unauthorized access to data by discovering and exploiting security vulnerabilities, he says. Based on the information it’s provided, Silent Signal hackers zero in on areas that are most likely to be exploited, Varga-Perke says.

    In case of IBM i, we found that due to the complexity of the privilege system, a comprehensive configuration review can be a more suitable approach,” he adds. “In this case, we extract security configuration using a high-privilege user account, and use this data to uncover attack paths at scale which is especially important for systems with high number of users.”

    Once the penetration testing is complete, Silent Signal issues a report that documents what it found, including how it exploited vulnerabilities to gain access to the system and what the client should do to remediate the problems, Varga-Perke says. In some cases, there will be an more consulting work to help train the client in security issues.

    “Having fixed the issues, we recommend our clients to run a ‘recheck’ where we do an additional round of checks to make sure that countermeasures are implemented correctly,” he says.

    In addition to these client engagements, Silent Signal also conducts its own security research into IBM i, including the “low-level implementation of specific controls,” Varga-Perke says.

    “We are particularly concerned about this area, as it only took us a couple of days to discover a critical vulnerability in a default service, and we could already confirm that at least some rumored design weaknesses are in fact present in the latest systems,” he says. “Because of the aforementioned secrecy, assessing the true impact of these issues is not trivial, and we are still in the process of preparing this information for sharing.”

    The IBM i server is a relatively obscure system that is not found in the wild as often as it previously was. With that said, this “security through obscurity” is not something that should be relied upon, according to Varga-Perke.

    “I’d also mention secrecy as a weakness: you can get all your controls right, if you can’t evaluate how these controls are enforced at low level,” he says. “Other vendors learned the hard way that they can’t keep security critical information secret for long, and they realized the benefits of opening up themselves for research. I believe IBM is lagging behind here.”

    For more information on Silent Signal’s approach to hacking IBM i, check out its recent blog post.

    RELATED STORIES

    The Global State of Cybersecurity Is Not Good

    Security Alert: The Anti-Alfred E. Newman Effect

    One IBM i Shop’s Close Call With Ransomware

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Tags: Tags: IBM i, Silent Signal

    Sponsored by
    WorksRight Software

    Do you need area code information?
    Do you need ZIP Code information?
    Do you need ZIP+4 information?
    Do you need city name information?
    Do you need county information?
    Do you need a nearest dealer locator system?

    We can HELP! We have affordable AS/400 software and data to do all of the above. Whether you need a simple city name retrieval system or a sophisticated CASS postal coding system, we have it for you!

    The ZIP/CITY system is based on 5-digit ZIP Codes. You can retrieve city names, state names, county names, area codes, time zones, latitude, longitude, and more just by knowing the ZIP Code. We supply information on all the latest area code changes. A nearest dealer locator function is also included. ZIP/CITY includes software, data, monthly updates, and unlimited support. The cost is $495 per year.

    PER/ZIP4 is a sophisticated CASS certified postal coding system for assigning ZIP Codes, ZIP+4, carrier route, and delivery point codes. PER/ZIP4 also provides county names and FIPS codes. PER/ZIP4 can be used interactively, in batch, and with callable programs. PER/ZIP4 includes software, data, monthly updates, and unlimited support. The cost is $3,900 for the first year, and $1,950 for renewal.

    Just call us and we’ll arrange for 30 days FREE use of either ZIP/CITY or PER/ZIP4.

    WorksRight Software, Inc.
    Phone: 601-856-8337
    Fax: 601-856-9432
    Email: software@worksright.com
    Website: www.worksright.com

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Smart Modernization Is The Answer To IBM i Talent Shortage IBM i PTF Guide, Volume 24, Number 40

    Leave a Reply Cancel reply

TFH Volume: 32 Issue: 64

This Issue Sponsored By

  • Maxava
  • LANSA
  • WorksRight Software
  • UCG Technologies
  • Raz-Lee Security

Table of Contents

  • Pen Tester Silent Signal Targets IBM i
  • Smart Modernization Is The Answer To IBM i Talent Shortage
  • Remain Hooks TD/OMS Into Azure DevOps
  • Four Hundred Monitor, September 28
  • Take A Minute, And Take The IBM i Marketplace Survey

Content archive

  • The Four Hundred
  • Four Hundred Stuff
  • Four Hundred Guru

Recent Posts

  • IBM Pulls The Curtain Back A Smidge On Project Bob
  • IBM Just Killed Merlin. Here’s Why
  • Guru: Playing Sounds From An RPG Program
  • A Bit More Insight Into IBM’s “Spyre” AI Accelerator For Power
  • IBM i PTF Guide, Volume 27, Number 42
  • What You Will Find In IBM i 7.6 TR1 and IBM i 7.5 TR7
  • Three Things For IBM i Shops To Consider About DevSecOps
  • Big Blue Converges IBM i RPG And System Z COBOL Code Assistants Into “Project Bob”
  • As I See It: Retirement Challenges
  • IBM i PTF Guide, Volume 27, Number 41

Subscribe

To get news from IT Jungle sent to your inbox every week, subscribe to our newsletter.

Pages

  • About Us
  • Contact
  • Contributors
  • Four Hundred Monitor
  • IBM i PTF Guide
  • Media Kit
  • Subscribe

Search

Copyright © 2025 IT Jungle