by Terence Martin | May 16, 2023 | Compliance, cybersecurity, penetration testing
Open source intelligence gathering, or OSINT, can be a threat to organizations because it can be used to gather information about their employees, assets, and vulnerabilities. This information can then be used to launch targeted scanning against discovered...
by Andrew Nash | Apr 4, 2023 | Compliance, cybersecurity, penetration testing
Overview One of the most common findings we make at Contextual Security Solutions during internal penetration tests is the presence of vulnerable network protocols, like Link-local Multicast Name Resolution (LLMNR), Web Proxy Auto-Discovery (WPAD)...
by Slade Griffin | Mar 5, 2020 | Uncategorized
What are you talking about? The PMK caching vulnerability was discovered in 2018 and has now been incorporated into most wireless auditing and testing techniques that we perform. So, what is this new thing? The technical aspect resides in the IEEE 802.11 I[1]...
Recent Comments