Core Security Blog | An IBM i Hacking Tale