Silent Signal

108 Followers
1 Following
30 Posts
Professional Ethical Hacking Services
Websitehttps://silentsignal.eu
Tech Bloghttps://blog.silentsignal.eu
GitHubhttps://github.com/silentsignal
Our newest blog post demonstrates once again that "attacks always get better, they never get worse" – and IBM i (AS/400) is no exception. Enjoy the next part of our journey along the trail of CVE-2023-30990: https://blog.silentsignal.eu/2025/09/04/Exploit-development-for-IBM-i/
Exploit development for IBM i

Because we can!

Silent Signal Techblog
Rage Against the Authentication State Machine

https://blog.silentsignal.eu/2025/06/14/gitblit-cve-CVE-2024-28080/

Beautiful authentication bypass in Gitblit from my old friends at @silentsignal !

CVE-2024-28080
Rage Against the Authentication State Machine

Because we can!

Silent Signal Techblog

In our new blog post we take a little journey from an IBM advisory to confirming a new hardening in Windows 11 24H2:

Vulnerability Archeology: Stealing Passwords with IBM i Access Client Solutions

https://blog.silentsignal.eu/2025/01/21/ibm-acs-password-dump/

#redteam #windows #ibmi #ReverseEngineering

Vulnerability Archeology: Stealing Passwords with IBM i Access Client Solutions

Because we can!

Silent Signal Techblog

We worked hard to collect our experiences in hiring pentesters for almost a decade! Here are our thoughts and the solutions for our (in)famous Mushroom🍄 challenge.

This is the Story of a Pentester Recruitment 2025:

https://blog.silentsignal.eu/2025/01/14/pentester-recruitment-2025-mushroom/

#pentest #hiring #hr

Story of a Pentester Recruitment 2025

Because we can!

Silent Signal Techblog

Santa brought new a blog post!

Handling Arbitrarily Nested Structures with #BurpSuite

https://blog.silentsignal.eu/2024/12/06/custom-decoder-for-burp/

Handling Arbitrarily Nested Structures with Burp Suite

Because we can!

Silent Signal Techblog

In our new blogpost we guide you through the process of improving the tools available for #pentesting WCF services over the net.tcp binding:

https://blog.silentsignal.eu/2024/10/28/wcf-net.tcp-pentest/

We created a brand new #Kaitai Struct based parser and implemented transformations so messages can be manipulated and replayed with #BurpSuite.

Engineering WCF Hacks

Because we can!

Silent Signal Techblog

The recording of our @WEareTROOPERS presentation is now online, enjoy!

#TROOPERS24 - IBM i for Wintel Hackers

https://www.youtube.com/watch?v=t4fUvfzgUbY

#IBMi

TROOPERS24: IBM i for Wintel Hackers

YouTube

IBM issued a fix to CVE-2024-27275 that mitigates an #IBMi privilege escalation technique we published last year:

🥷https://blog.silentsignal.eu/2023/03/30/booby-trapping-ibm-i/
🧑‍🏭https://ibm.com/support/pages/node/7157637

The PTF restricts the use of the ADDPFTRG command - this is a breaking change documented in the Memo to Users.

Booby Trapping IBM i

Because we can!

Silent Signal Techblog

We're stoked we got to present about low-level #IBMi internals today at @recon! Here you can find our detailed writeup:

https://silentsignal.github.io/BelowMI/

We also released our @kaitai definition for the *PGM serialization format:

https://github.com/silentsignal/PGM-Kaitai

...and our #Ghidra extensions:

https://github.com/silentsignal/PowerAS

Stay tuned for slides and demos!

#REcon24 #REconmtl #REcon2024

Below MI - IBM i for Hackers