ConCon Blog

Show left menu  
Hide left menu  
Push to Hack
Push To Hack: Reverse engineering an IP camera

By Alex Farrant and Neil Biggs, 02 Feb. 2016

For our most recent IoT adventure, we've examined an outdoor cloud security camera which like many devices of its generation a) has an associated mobile app b) is quick to ...

The Art of Cyberwar
Pen Testing: The Art of Cyberwar

27 Jan. 2016

The Art of War is a Chinese military text attributed to a general and strategist called Sun Tzu. Despite being published 2,500 years ago, his words still ring true: "If ...

ConCon2016
ConCon 2016

11 Jan. 2016

ConCon is our annual internal technical conference - it's an opportunity for a sizeable chunk of our technical community from the UK and Germany to get together for the day ...

Loudspeaker
Communicating a Cyber Attack - A Retrospective Look at the TalkTalk Incident

By Kat Demidecka, 14 Dec. 2015

The recent breach at TalkTalk received extensive coverage in the media and led to several conflicting reports on the extent of the compromise. This blog post will look at how ...

Espresso
EsPReSSO a refreshment on the hunt for Single Sign-On

By Tim Guenther, 30 Nov. 2015

EsPReSSO was developed as a Bachelor thesis in IT-Security by Tim Guenther, at Ruhr-University Bochum, and is based on the "BurpSSOExtension" by Christian Mainka. Context has supported Tim during this ...

SOC
Building a SOC: Thinking About Effective Incident Management

By Kat Demidecka, 26 Nov. 2015

While incident response is what we most often talk about, we also do a lot of work helping clients to proactively build resiliency and develop their internal cyber security capability. ...

Bandit Robbery
Data Exfiltration via Blind OS Command Injection

By Craig Donkin, 16 Nov. 2015

On a penetration test or CTF challenge you may come across an application that takes user input and passes it to a system command or to a supporting program that ...

Back to Top