ConCon Blog

Show left menu  
Hide left menu  
Sniffing HTTPS URLS with malicious PAC files

By Alex Chapman and Paul Stone, 27 July 2016

In March this year we discovered an issue with the way many web browsers and operating systems handle Proxy Auto-Config (PAC) files. PAC files are JavaScript code that tell the ...

Binary SMS
Binary SMS - The old backdoor to your new thing

By Alex Farrant, 20 July 2016

Despite being older than many of its users, Short Messaging Service (SMS) remains a very popular communications medium and is increasingly found on remote sensors, critical infrastructure and vehicles due ...

https header sign
The Security of HTTP-Headers

By Michael Skiba, 18 May 2016

When it comes to web application security one often thinks about the obvious: Sanitize user input, transmit data over encrypted channels and use secure functions. Often overlooked are the positive ...

Ramble icon
Bluetooth LE - Increasingly popular, but still not very private

By Scott Lester and Paul Stone, 05 May 2016

In May last year we wrote a blog post on our initial research on Bluetooth Low Energy (BLE). This covered our research into the new protocol, including what devices were ...

The rise and rise of red teaming
The rise and rise of red teaming

By Mark Nicholls, 20 April 2016

Red team testing is increasingly being employed by organisations across the business spectrum, but particularly in the banking and finance sector, to identify vulnerabilities that could leave them open to ...

RDP Replay Tool
RDP Replay Code Release

By Steve Elliott, 13 April 2016

In one of our previous blog posts, we wrote about how during routine monitoring on a client network, Context analysts noticed some unexpected RDP traffic and on further investigation it ...

Subverting the Agent on Network PATROL
Subverting the Agent on Network PATROL

By Kevin O'Reilly, 06 April 2016

A Red Team engagement led to the team discovering unprotected credentials encrypted with an infrastructure management product from software provider BMC. The CVE identifier for this is: CVE-2016-2348.Opportunities multiply as ...

Back to Top