fbpx

Blogs & Articles

Cybersecurity News, Latest Vulnerabilities, Hacking Tutorials

How to Get Started with Code Review

How to Get Started with Code Review

Code review is an essential part of the web application penetration testing process but is often overlooked. We’re going to look at why it’s important and how to get started. There are a number of reasons why we might decide to review the source code of an application...

The Science of Learning for Hackers

The Science of Learning for Hackers

The science behind learning is a fascinating field that’s constantly evolving. There is no single, definitive answer to what the most effective learning technique is, and if there was, it would likely vary from person to person. However, there are a number of...

Getting Started with Offensive JavaScript

Getting Started with Offensive JavaScript

JavaScript is a bit like Marmite, you either love it or hate it. Regardless of how it makes us feel, it is a powerful tool for attacking users and exploitation. Often, popping alert(1) is proof enough to get a fix but doesn’t demonstrate the full impact an attacker...

Things to Try When your Reverse Shell Fails

Things to Try When your Reverse Shell Fails

Target enumerated, check.Vulnerability identified, check.Tested payload delivery, check.RCE verified, check.Reverse shell...nope. Today we are going to look at some practical ways to troubleshoot your reverse shell. Some of these points come from logical thinking,...

Penetration Testing – PCI Compliance – Auditing

See How We Can Secure Your Assets

Let’s talk about how TCM Security can solve your cybersecurity needs. Give us a call, send us an e-mail, or fill out the contact form below to get started.

 

tel: (877) 771-8911 | email: [email protected]