ConCon Blog

Show left menu  
Hide left menu  
SAP exploitation
SAP Exploitation – Part 2

30 Aug. 2011

This is the second in a series of posts about SAP infrastructure security, specifically related to RFC vulnerabilities and common misconfigurations that can be exploited by an attacker to gain ...

Security Flaws
WebGL – More WebGL Security Flaws

16 June 2011

Summary In this blog post Context demonstrates how to steal user data through web browsers using a vulnerability in Firefox’s implementation of WebGL. This is a continuation of our research ...

FAQ
UPDATE: WebGL FAQ

11 May 2011

Due to the high level of interest in Context’s blog posting on the Security issues within WebGL we are releasing the following further information to aid in the understanding of ...

A new dimension
WebGL - A New Dimension for Browser Exploitation

09 May 2011

Update: 11th May 2011 - Due to the high level of interest in Context’s blog posting on the Security issues within WebGL we are releasing the following FAQ. Summary WebGL ...

SAP 1
SAP Exploitation – Part 1

06 April 2011

In this series of posts I aim to cover in depth some of the publically known infrastructure vulnerabilities that affect SAP (which stands for "Systems, Applications and Products in Data ...

Keeping you awake at night
Server Technologies - SSL2: Should it keep you awake at night?

28 March 2011

One of the issues Context encounters time and time again is web servers that support version 2 of the SSL protocol. The weaknesses in SSL2 are a significant issue that ...

USB
SmartPhones - Can you Trust your USB Charger?

28 Jan. 2011

One of the biggest trends in the consumer electronics sector, over the past few years, has been the rise in the use of the now ubiquitous USB connection as the ...

Back to Top