September 16, 2015 Alex Woodie
Two weeks ago we told you about a presentation about hacking the IBM i server that was held at the recent DEF CON conference. Now the hacker behind the presentation is taking exception with assertions in the story, and insists that his hacking technique exploits security flaws in IBM i OS and don’t rely on poor server configurations. Carol Woodbury, a former IBM security architect, looks into the hacker’s new claims.
Bart Kulach, who runs the www.hackthelegacy.org website and delivered a DEF CON presentation by the same name, sent us this letter. It’s reprinted here with his permission: