ConCon Blog

Show left menu  
Hide left menu  
Dark comet
Malware Analysis - Dark Comet RAT

02 Nov. 2011

A Remote Administration Tool (otherwise known as a RAT) is a piece of software designed to provide full access to remote clients. Capabilities often include keystroke logging, file system access ...

Proxy
Server Technologies - Reverse Proxy Bypass

06 Oct. 2011

In this blog I will describe a new type of security vulnerability which can allow full internal system access from the internet from an unauthenticated perspective. This technique exploits insecurely ...

SAP exploitation
SAP Exploitation – Part 2

30 Aug. 2011

This is the second in a series of posts about SAP infrastructure security, specifically related to RFC vulnerabilities and common misconfigurations that can be exploited by an attacker to gain ...

Security Flaws
WebGL – More WebGL Security Flaws

16 June 2011

Summary In this blog post Context demonstrates how to steal user data through web browsers using a vulnerability in Firefox’s implementation of WebGL. This is a continuation of our research ...

FAQ
UPDATE: WebGL FAQ

11 May 2011

Due to the high level of interest in Context’s blog posting on the Security issues within WebGL we are releasing the following further information to aid in the understanding of ...

A new dimension
WebGL - A New Dimension for Browser Exploitation

09 May 2011

Update: 11th May 2011 - Due to the high level of interest in Context’s blog posting on the Security issues within WebGL we are releasing the following FAQ. Summary WebGL ...

SAP 1
SAP Exploitation – Part 1

06 April 2011

In this series of posts I aim to cover in depth some of the publically known infrastructure vulnerabilities that affect SAP (which stands for "Systems, Applications and Products in Data ...

Back to Top