• The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
Menu
  • The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
  • Pen Tester Silent Signal Targets IBM i

    September 28, 2022 Alex Woodie

    If you’re in the market for penetration testing services, you might be interested in hearing about a relatively new player in the market named Silent Signal. The Budapest, Hungary-based outfit has been offering IBM i penetration testing for the past year, and it’s already found security vulnerabilities in its clients’ systems.

    Silent Signal has been providing penetration testing, IT security assessments, and training since it was founded by a trio of security experts in 2009. With around a dozen security certifications to their credits, the security experts are well versed in the standard methods companies use to block hackers and cybercriminals from compromising systems. By adding ethical hacking to the mix, Silent Signal looks for non-traditional routes to compromising systems.

    According to one of the co-founders, Balint Varga-Perke, the company made the decision to open an IBM i penetration testing specialty last year based on their experience with the booming sub-sector of security services.

    “We started the [IBM i] research in 2021, primarily motivated by our pen test project experience,” Varga-Perke tells IT Jungle. “While there are some materials out there about testing the security of these systems, when facing real targets we realized that we can get beyond those quickly just by looking at the official documentation. Since we strongly believe in systematic approaches when it comes to security testing, we decided to create our own IBM i lab and testing methodology.”

    The interest among IBM i shops was “immediate,” Varga-Perke says. The company was pleased at the interest in penetration testing services for IBM i, but they were not surprised.

    “Our projects focus on what our customers – the users of IBM i – can get wrong,” he says. “This mainly involves identifying configuration issues allowing unauthorized access to data either from the ‘outside’ or across legitimate users.”

    The IBM i is an enigma in some ways, as it combines excellent security protections in some respects but falls short in others. Specifically, Varga-Perke hailed the IBM i operating system’s object-oriented architecture, which he says provides “a strong foundation for security, because raw data can’t be accessed in arbitrary ways.”

    While this approach enables “a high granularity of access controls, too,” that functions as a double-edge sword.

    “Precise declaration of rules is always important, but at the same time, the complexity can make people cut corners,” he says. “We see exploitable vulnerabilities arising from this all the time.”

    When Silent Signal engages an IBM i penetration testing customer, the scope is always well-defined, which helps to minimize any risk involved “when using the systems in unexpected ways (which is basically what hacking is),” Varga-Perke says. “We don’t approach anyone saying ‘Hey, we found your green screen on the Internet and logged in with a weak password.’ We need authorization from the system owner to do anything.”

    During penetration testing, the company simulates malicious actors with different levels of initial access to the target systems, he says. The goal is typically to obtain unauthorized access to data by discovering and exploiting security vulnerabilities, he says. Based on the information it’s provided, Silent Signal hackers zero in on areas that are most likely to be exploited, Varga-Perke says.

    In case of IBM i, we found that due to the complexity of the privilege system, a comprehensive configuration review can be a more suitable approach,” he adds. “In this case, we extract security configuration using a high-privilege user account, and use this data to uncover attack paths at scale which is especially important for systems with high number of users.”

    Once the penetration testing is complete, Silent Signal issues a report that documents what it found, including how it exploited vulnerabilities to gain access to the system and what the client should do to remediate the problems, Varga-Perke says. In some cases, there will be an more consulting work to help train the client in security issues.

    “Having fixed the issues, we recommend our clients to run a ‘recheck’ where we do an additional round of checks to make sure that countermeasures are implemented correctly,” he says.

    In addition to these client engagements, Silent Signal also conducts its own security research into IBM i, including the “low-level implementation of specific controls,” Varga-Perke says.

    “We are particularly concerned about this area, as it only took us a couple of days to discover a critical vulnerability in a default service, and we could already confirm that at least some rumored design weaknesses are in fact present in the latest systems,” he says. “Because of the aforementioned secrecy, assessing the true impact of these issues is not trivial, and we are still in the process of preparing this information for sharing.”

    The IBM i server is a relatively obscure system that is not found in the wild as often as it previously was. With that said, this “security through obscurity” is not something that should be relied upon, according to Varga-Perke.

    “I’d also mention secrecy as a weakness: you can get all your controls right, if you can’t evaluate how these controls are enforced at low level,” he says. “Other vendors learned the hard way that they can’t keep security critical information secret for long, and they realized the benefits of opening up themselves for research. I believe IBM is lagging behind here.”

    For more information on Silent Signal’s approach to hacking IBM i, check out its recent blog post.

    RELATED STORIES

    The Global State of Cybersecurity Is Not Good

    Security Alert: The Anti-Alfred E. Newman Effect

    One IBM i Shop’s Close Call With Ransomware

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Tags: Tags: IBM i, Silent Signal

    Sponsored by
    Maxava

    Migrate IBM i with Confidence

    Tired of costly and risky migrations? Maxava Migrate Live minimizes disruption with seamless transitions. Upgrading to Power10 or cloud hosted system, Maxava has you covered!

    Learn More

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Smart Modernization Is The Answer To IBM i Talent Shortage IBM i PTF Guide, Volume 24, Number 40

    Leave a Reply Cancel reply

TFH Volume: 32 Issue: 64

This Issue Sponsored By

  • Maxava
  • LANSA
  • WorksRight Software
  • UCG Technologies
  • Raz-Lee Security

Table of Contents

  • Pen Tester Silent Signal Targets IBM i
  • Smart Modernization Is The Answer To IBM i Talent Shortage
  • Remain Hooks TD/OMS Into Azure DevOps
  • Four Hundred Monitor, September 28
  • Take A Minute, And Take The IBM i Marketplace Survey

Content archive

  • The Four Hundred
  • Four Hundred Stuff
  • Four Hundred Guru

Recent Posts

  • Meet The Next Gen Of IBMers Helping To Build IBM i
  • Looks Like IBM Is Building A Linux-Like PASE For IBM i After All
  • Will Independent IBM i Clouds Survive PowerVS?
  • Now, IBM Is Jacking Up Hardware Maintenance Prices
  • IBM i PTF Guide, Volume 27, Number 24
  • Big Blue Raises IBM i License Transfer Fees, Other Prices
  • Keep The IBM i Youth Movement Going With More Training, Better Tools
  • Remain Begins Migrating DevOps Tools To VS Code
  • IBM Readies LTO-10 Tape Drives And Libraries
  • IBM i PTF Guide, Volume 27, Number 23

Subscribe

To get news from IT Jungle sent to your inbox every week, subscribe to our newsletter.

Pages

  • About Us
  • Contact
  • Contributors
  • Four Hundred Monitor
  • IBM i PTF Guide
  • Media Kit
  • Subscribe

Search

Copyright © 2025 IT Jungle