fbpx

Blog

Should You Change Penetration Testing Vendors Each Year? 

Should You Change Penetration Testing Vendors Each Year? 

While performing external penetration testing, one of the primary ways to breach the perimeter and Clients often ask if they should keep the same penetration testing vendor each year or rotate. While we hate to depart with our clients and pride ourselves in cultivating a partnership with them, we always adhere to giving unbiased advice.

Read More
Top 4 Reasons Security Assessment Quotes are Different 

Top 4 Reasons Security Assessment Quotes are Different 

The majority of our internal penetration tests are at least a week long.  While we generally have a drop We frequently hear from our clients about the disparity between pricing quotes from multiple vendors. Unfortunately, this often leaves clients lost as they aren’t sure what is a fair price for a quality engagement. It can

Read More
How Hackers Guess Your Passwords 

How Hackers Guess Your Passwords 

While performing external penetration testing, one of the primary ways to breach the perimeter and obtain internal network access is through password spraying login portals such as O365, VPNs, and employee-only sites. Password spraying works by trying one password against multiple users and relies heavily on password guessing from the attacker. Many of our clients

Read More
Internal Persistence Techniques

Internal Persistence Techniques

The majority of our internal penetration tests are at least a week long.  While we generally have a drop box sent to the client to enable our access to the network, we have to consider efficiency as well.  Ensuring persistent access in a network is vital to that efficiency, as well as our ability to

Read More
So You Want to Be a Hacker: 2022 Edition

So You Want to Be a Hacker: 2022 Edition

Video Version: Introduction Last year, I posted a blog (https://tcm-sec.com/so-you-want-to-be-a-hacker-2021-edition/) and video (https://www.youtube.com/watch?v=mdsChhW056A) on how to become an ethical hacker in 2021. Given that it was well received, I thought it might be fun to update the blog with resources for 2022. So, without further ado, let’s chat about how you can break into the

Read More
Top 5 Vulnerabilities We See on Web Apps

Top 5 Vulnerabilities We See on Web Apps

TCM Security regularly conducts web application penetration testing for clients of all shapes and sizes, and these applications are the online face of our enterprises. Being accessible across the Internet as a whole makes websites of any size a potential target, and the necessity of maintaining sound security practices is paramount. Today we will show

Read More
Bypassing Defender the Easy Way – FodHelper

Bypassing Defender the Easy Way – FodHelper

If you’ve ever tried to run a command prompt as administrator on your Windows OS before, you’ve seen a harmless popup appear. This is Windows User Account Control, or UAC. According to Microsoft, UAC “is a fundamental component of Microsoft’s overall security vision. UAC helps mitigate the impact of malware.” (How User Account Control Works)

Read More
Pentest Tales #002: Digging Deep​

Pentest Tales #002: Digging Deep​

Pentest Tales #002: Digging Deep Welcome to the second edition of Pentest Tales, a blog series that walks through real-world pentests we’ve performed in the past.  The purpose of this blog is not just to share the “owning” of a domain, but to provide education as to why a domain was owned in the first

Read More
SMB Relay Attacks – Gift That Keeps on Giving

SMB Relay Attacks – Gift That Keeps on Giving

With all of the new Microsoft vulnerabilities features being exploited lately, it’s important to consider some of the vulnerabilities that have truly withstood the test of time. Flavor of the Month vulnerabilities like PrinterNightmare and attacking Active Directory Certificate Services may seem incredible currently (and they are), but they end up being manually patched out

Read More
Kerberoasting Domain Accounts

Kerberoasting Domain Accounts

The Gift That Keeps on Giving Few vulnerabilities in the Windows Active Directory environment have had the long-lasting impact that Service Principal Names (SPN) have.  Domain-connected services, such as MSSQL servers, web servers, and more may be connected and issued identifiers that allow Kerberos to authenticate the service account.  If a domain user account is

Read More