fbpx

Author: Joe Helle

  • Blog
  • Author: Joe Helle
Internal Persistence Techniques

Internal Persistence Techniques

The majority of our internal penetration tests are at least a week long.  While we generally have a drop box sent to the client to enable our access to the network, we have to consider efficiency as well.  Ensuring persistent access in a network is vital to that efficiency, as well as our ability to

Read More
Top 5 Vulnerabilities We See on Web Apps

Top 5 Vulnerabilities We See on Web Apps

TCM Security regularly conducts web application penetration testing for clients of all shapes and sizes, and these applications are the online face of our enterprises. Being accessible across the Internet as a whole makes websites of any size a potential target, and the necessity of maintaining sound security practices is paramount. Today we will show

Read More
Bypassing Defender the Easy Way – FodHelper

Bypassing Defender the Easy Way – FodHelper

If you’ve ever tried to run a command prompt as administrator on your Windows OS before, you’ve seen a harmless popup appear. This is Windows User Account Control, or UAC. According to Microsoft, UAC “is a fundamental component of Microsoft’s overall security vision. UAC helps mitigate the impact of malware.” (How User Account Control Works)

Read More
SMB Relay Attacks – Gift That Keeps on Giving

SMB Relay Attacks – Gift That Keeps on Giving

With all of the new Microsoft vulnerabilities features being exploited lately, it’s important to consider some of the vulnerabilities that have truly withstood the test of time. Flavor of the Month vulnerabilities like PrinterNightmare and attacking Active Directory Certificate Services may seem incredible currently (and they are), but they end up being manually patched out

Read More
Kerberoasting Domain Accounts

Kerberoasting Domain Accounts

The Gift That Keeps on Giving Few vulnerabilities in the Windows Active Directory environment have had the long-lasting impact that Service Principal Names (SPN) have.  Domain-connected services, such as MSSQL servers, web servers, and more may be connected and issued identifiers that allow Kerberos to authenticate the service account.  If a domain user account is

Read More
ASREP Roasting & Pre-Authentication in AD Environments

ASREP Roasting & Pre-Authentication in AD Environments

Any Systems Administrator knows that the task of securing an Active Directory environment is a never-ending task.  Since the first Windows AD was released with Server 2000, Microsoft has added countless features.  Many of these features are created with connectivity in mind, and some are there to bypass security features to allow accessibility with incompatible

Read More
Boost Your Security Program for WFH Employees

Boost Your Security Program for WFH Employees

With communities beginning to open back up, companies are considering the decision to stay remote.  And this comes with good reasons.  The cost of leasing space might be prohibitive and downsizing to host only necessary business functions could help with expenses.  During the pandemic, your organization may have seen an increase in productivity and employee

Read More