by TCMS Staff | Jan 8, 2025 | Programming
In this blog post, I’ll guide you through a project to start learning assembly, showing you all the steps and breaking the code down into manageable sections. For the project, we’ll code a number guessing game for a retro processor using an emulator that makes...
by TCMS Staff | Dec 25, 2024 | SOC
Honeypots: Detection, Recon, and Misdirection A honeypot in cyber security is basically a trap that lures in attackers and can slow down the pace of an attack, gather actionable intelligence, and even alert an organization that an attack is occurring. In this blog,...
by TCMS Staff | Dec 4, 2024 | Linux
What is PimpMyKali? PimpMyKali is a post-installation script that automates the setup, customization, and configuration of tooling within Kali Linux. From installing essential penetration test tooling to configuring system settings to streamlining the setup process,...
by TCMS Staff | Nov 29, 2024 | IoT and Hardware Hacking
Introducing an IoT Testing Certification for Beginners TCM Security’s Practical IoT Pentest Associate (PIPA) is a unique IoT testing certification that requires exam takers to perform hands-on testing of IoT firmware to identify vulnerabilities and write a...
by TCMS Staff | Nov 20, 2024 | IoT and Hardware Hacking
Introduction In part four of our “Getting Started with IoT and Hardware Hacking” series we will reverse engineer the httpd binary and libdt.so library to look for vulnerabilities. We will take a look at how to use Ghidra to decompile and reverse engineer...