TCM Security
  • Home
  • About
  • Our Services
    • Offense – Penetration Testing
      • External Penetration Testing
      • Internal Penetration Testing
      • Physical Penetration Testing
      • Social Engineering
      • Vulnerability Scanning
      • Web Application Penetration Testing
      • Wireless Penetration Testing
    • Defense – Security & Managed Services
      • Active Directory Security
      • Endpoint Detection & Response (EDR)
      • Data Protection & Recovery
      • Managed Detection & Response (MDR/SOC)
      • Managed Email Security
      • Network Security
      • Security Team Staffing
      • Vulnerability Management
    • Auditing
      • Cloud Security Assessment
      • Malware Assessment
      • Network Config Assessment
      • Password Audit
      • Security Policy Assessment
      • Security Risk Assessment
    • PCI DSS QSA
    • Tailored Consulting
  • Training
    • Academy
    • Certifications
    • Live Training
  • Blog
  • Contact Us
Select Page
LLMNR Poisoning and How to Prevent It in Active Directory

LLMNR Poisoning and How to Prevent It in Active Directory

by Heath Adams | Sep 25, 2023 | Active Directory, Penetration Testing

0. Overview Active Directory (AD) stands as a foundational piece for many organizational networks, streamlining administrative tasks and enhancing productivity. However, out of the box, AD comes bundled with various features and default settings that can be exploited...
SMB Relay Attacks and How to Prevent Them in Active Directory

SMB Relay Attacks and How to Prevent Them in Active Directory

by Heath Adams | Sep 21, 2023 | Active Directory, Penetration Testing

0. Overview Many organizational networks rely on Active Directory (AD) to streamline administrative tasks and enhance efficiency. However, some of its default configurations are vulnerable to attackers. The SMB (Server Message Block) protocols stand out as...
Unearthing Secrets in Git Logs

Unearthing Secrets in Git Logs

by Alex Olsen | Sep 13, 2023 | Penetration Testing, Web Applications

Overview Version control systems, such as Git, are essential tools in software development, enabling seamless collaboration and change tracking. However, their widespread use can sometimes lead to unintended security oversights. While Git excels in managing code...
Find and Exploit Server-Side Template Injection (SSTI)

Find and Exploit Server-Side Template Injection (SSTI)

by Alex Olsen | Aug 23, 2023 | Penetration Testing, Web Applications

Server-Side Template Injection (SSTI) is an attack that allows an attacker to inject malicious input into a templating engine, leading to code execution on the server. While this vulnerability can be quite impactful, understanding and exploiting it requires a good...
Find and Exploit Blind SSRF with Out-of-Band (OOB) Techniques

Find and Exploit Blind SSRF with Out-of-Band (OOB) Techniques

by Alex Olsen | Aug 16, 2023 | Penetration Testing, Web Applications

Server-Side Request Forgery (SSRF) is a vulnerability that let’s an attacker have a server make requests on their behalf. Typically this can allow the attacker to reach internal resources that would otherwise be unavailable. Whilst the typical SSRF is dangerous...
Understanding and Hacking GraphQL: Part 1

Understanding and Hacking GraphQL: Part 1

by Alex Olsen | Aug 9, 2023 | Penetration Testing, Security, Web Applications

GraphQL, a query language for your API and a server-side runtime for executing those queries, is rapidly becoming a prevalent technology in modern web applications. This technology, developed by Facebook in 2012 and released as an open-source project in 2015, provides...
« Older Entries
Next Entries »

Recent Posts

  • Coding Projects for Beginners
  • Python vs C# – A Pentester Perspective
  • Introduction To Digital Privacy
  • How to Learn Assembly: Beginner Project
  • Social Engineering And External Pentests

Categories

  • Active Directory
  • Blog
  • Career Advice
  • Cybersecurity Awareness
  • Exploit Development
  • Help
  • IoT and Hardware Hacking
  • Learning
  • Linux
  • Password Manager
  • PCI-DSS
  • Penetration Testing
  • Programming
  • Security
  • SOC
  • TCMS News
  • Web Applications

Tags

access control assembly bash Burp Suite c# c sharp CTFs cybersecurity education ethical hacking hacking tools hackthebox hardware hacking how hackers find you htb incident response internal pentesting interviewing iot hacking job applications kali linux log analysis mental health mobile application mobile apps network assessment networking note keeping note taking open-source intelligence osint penetration test penetration testing pentesting pentest or red team Pentest Quotes powershell python red team engagement red teaming resume writing Security Assessment soc 2 soc analyst soc certification social engineering
TCM Security, Inc. © Copyright 2025 | Trust Center | Privacy Policy