Contextual Security Solutions Blog



Remote Access to the Workplace

Several companies have shifted their workforce from an environment they believe they control to an environment they definitely do NOT control; the employee’s home. There is still A LOT of misunderstanding between traditional IT infrastructure personnel and the...

PMKID Wireless Vulnerability Proof of Concept

What are you talking about? The PMK caching vulnerability was discovered in 2018 and has now been incorporated into most wireless auditing and testing techniques that we perform. So, what is this new thing? The technical aspect resides in the IEEE 802.11 I[1]...

Using Root in Kali 2020

Kali linux has undergone many changes over the past year. With a new UI, transitioning to python3, and a host of new tools, 2019 was a big year for the Kali Linux team. Now, after some telling blog posts, the Kali team has made even more changes to the distribution...

A Recon-NG Update Primer

Recently, Tim Tomes (@LaNMaSteR53 on Twitter) made a huge update to his recon-ng program. I am grateful for his hard work, dedication, and generosity as he serves the infosec community and provides such a wonderful free tool. The new update changed a lot of the syntax...

Contextual Security
5100 Poplar Avenue, 27th Floor
Memphis, TN 38137
844 5-CONSEC (26-6732)

Let’s have a chat. We will call you right back!

14 + 9 =

Solid security begins with knowing. Excels by doing.