TCM Security
  • Home
  • About
  • Our Services
    • Offense – Penetration Testing
      • External Penetration Testing
      • Internal Penetration Testing
      • Physical Penetration Testing
      • Social Engineering
      • Vulnerability Scanning
      • Web Application Penetration Testing
      • Wireless Penetration Testing
    • Defense – Security & Managed Services
      • Active Directory Security
      • Endpoint Detection & Response (EDR)
      • Data Protection & Recovery
      • Managed Detection & Response (MDR/SOC)
      • Managed Email Security
      • Network Security
      • Security Team Staffing
      • Vulnerability Management
    • Auditing
      • Cloud Security Assessment
      • Malware Assessment
      • Network Config Assessment
      • Password Audit
      • Security Policy Assessment
      • Security Risk Assessment
    • PCI DSS QSA
    • Tailored Consulting
  • Training
    • Academy
    • Certifications
    • Live Training
  • Blog
  • Contact Us
Select Page
How to Pass the PIPA Certification Exam

How to Pass the PIPA Certification Exam

by codelabs | Nov 29, 2024 | IoT and Hardware Hacking

Introducing an IoT Testing Certification for Beginners TCM Security’s Practical IoT Pentest Associate (PIPA) is a unique IoT testing certification that requires exam takers to perform hands-on testing of IoT firmware to identify vulnerabilities and write a...
Reverse Engineering and Exploiting Binaries: Hardware Hacking Part 4

Reverse Engineering and Exploiting Binaries: Hardware Hacking Part 4

by codelabs | Nov 20, 2024 | IoT and Hardware Hacking

Introduction In part four of our “Getting Started with IoT and Hardware Hacking” series we will reverse engineer the httpd binary and libdt.so library to look for vulnerabilities. We will take a look at how to use Ghidra to decompile and reverse engineer...
Getting Started with IoT & Hardware Hacking: Part One- Don’t Break the Bank

Getting Started with IoT & Hardware Hacking: Part One- Don’t Break the Bank

by codelabs | Jul 3, 2024 | IoT and Hardware Hacking

Introduction Over the last decade, the IoT landscape has witnessed significant growth, with an estimated 18 billion devices currently connected, and this number is rapidly expanding with each passing year. Projections suggest that the count could soar to 40 billion in...

Recent Posts

  • Coding Projects for Beginners
  • Python vs C# – A Pentester Perspective
  • Introduction To Digital Privacy
  • How to Learn Assembly: Beginner Project
  • Social Engineering And External Pentests

Categories

  • Active Directory
  • Blog
  • Career Advice
  • Cybersecurity Awareness
  • Exploit Development
  • Help
  • IoT and Hardware Hacking
  • Learning
  • Linux
  • Password Manager
  • PCI-DSS
  • Penetration Testing
  • Programming
  • Security
  • SOC
  • TCMS News
  • Web Applications

Tags

access control assembly bash Burp Suite c# c sharp CTFs cybersecurity education ethical hacking hacking tools hackthebox hardware hacking how hackers find you htb incident response internal pentesting interviewing iot hacking job applications kali linux log analysis mental health mobile application mobile apps network assessment networking note keeping note taking open-source intelligence osint penetration test penetration testing pentesting pentest or red team Pentest Quotes powershell python red team engagement red teaming resume writing Security Assessment soc 2 soc analyst soc certification social engineering
TCM Security, Inc. © Copyright 2025 | Trust Center | Privacy Policy