Below MI – IBM i for hackers
In this writeup we provide a summary of technical information crucial to evaulate the exploitability and impact of memory safety problems in IBM i programs. As administrators and developers of IBM i aren’t supposed to work “below MI level” this kind of information is not officially documented by the vendor. The information presented here is thus based on already published reverse engineering results, and our own findings uncovered using IBM’s System Sertice Tools (SST) and th … ⌘ Read more

⤋ Read More

Participate

Login to join in on this yarn.