ConCon Blog

Show left menu  
Hide left menu  
Push to Hack
Push To Hack: Reverse engineering an IP camera

By Alex Farrant and Neil Biggs, 02 Feb. 2016

We're always interested in looking at the security of consumer and enterprise kit, whether it's for a customer as part of a product security evaluation, or for our own interest. ...

The Art of Cyberwar
Pen Testing: The Art of Cyberwar

27 Jan. 2016

The Art of War is a Chinese military text attributed to a general and strategist called Sun Tzu. Despite being published 2,500 years ago, his words still ring true: "If ...

ConCon 2016

11 Jan. 2016

ConCon is our annual internal technical conference - it's an opportunity for a sizeable chunk of our technical community from the UK and Germany to get together for the day ...

Communicating a Cyber Attack - A Retrospective Look at the TalkTalk Incident

By Kat Demidecka, 14 Dec. 2015

The recent breach at TalkTalk received extensive coverage in the media and led to several conflicting reports on the extent of the compromise. This blog post will look at how ...

EsPReSSO a refreshment on the hunt for Single Sign-On

By Tim Guenther, 30 Nov. 2015

EsPReSSO was developed as a Bachelor thesis in IT-Security by Tim Guenther, at Ruhr-University Bochum, and is based on the "BurpSSOExtension" by Christian Mainka. Context has supported Tim during this ...

Building a SOC: Thinking About Effective Incident Management

By Kat Demidecka, 26 Nov. 2015

While incident response is what we most often talk about, we also do a lot of work helping clients to proactively build resiliency and develop their internal cyber security capability. ...

Bandit Robbery
Data Exfiltration via Blind OS Command Injection

By Craig Donkin, 16 Nov. 2015

On a penetration test or CTF challenge you may come across an application that takes user input and passes it to a system command or to a supporting program that ...

Back to Top