ConCon Blog

Show left menu  
Hide left menu  
Red error message
The New glibc Vulnerability that Desperately Needs a Name

By Alise Silde, 02 March 2016

A lighthearted view on the latest glibc vulnerability and how it compares to similar older issues.The GNU C Library, most common in Linux environments, but also widely-used for interfacing with ...

Do you remeber this packet
Do you remember this packet?

By Adam Bridge, 17 Feb. 2016

Whilst attempting to recover the DNS cache from a Windows memory sample, we made a mistake and accidentally stumbled across something much more interesting: the incoming and outgoing packet buffer ...

Push to Hack
Push To Hack: Reverse engineering an IP camera

By Alex Farrant and Neil Biggs, 02 Feb. 2016

For our most recent IoT adventure, we've examined an outdoor cloud security camera which like many devices of its generation a) has an associated mobile app b) is quick to ...

The Art of Cyberwar
Pen Testing: The Art of Cyberwar

27 Jan. 2016

The Art of War is a Chinese military text attributed to a general and strategist called Sun Tzu. Despite being published 2,500 years ago, his words still ring true: "If ...

ConCon 2016

11 Jan. 2016

ConCon is our annual internal technical conference - it's an opportunity for a sizeable chunk of our technical community from the UK and Germany to get together for the day ...

Communicating a Cyber Attack - A Retrospective Look at the TalkTalk Incident

By Kat Demidecka, 14 Dec. 2015

The recent breach at TalkTalk received extensive coverage in the media and led to several conflicting reports on the extent of the compromise. This blog post will look at how ...

EsPReSSO a refreshment on the hunt for Single Sign-On

By Tim Guenther, 30 Nov. 2015

EsPReSSO was developed as a Bachelor thesis in IT-Security by Tim Guenther, at Ruhr-University Bochum, and is based on the "BurpSSOExtension" by Christian Mainka. Context has supported Tim during this ...

Back to Top