by Alex Olsen | Feb 3, 2023 | Blog, Learning, Penetration Testing, Security
Hypertext Transfer Protocol (HTTP) is an application layer protocol. On the surface, HTTP can appear quite simple, but there are a lot of quirks considering its use across inconsistent browsers and servers. Check out a video version of this article: Breaking Down An...
by TCMS Staff | Jan 28, 2023 | Help, Penetration Testing, Security
One of the most underrated resources in your toolkit as an I.T. Professional is your ability to take notes. Ironically, this is also one of the least mentioned skills discussed when learning the fundamentals of anything new. We often get asked a variety of questions...
by TCMS Staff | Jan 13, 2023 | Help, Penetration Testing, Security
As with any industry, with jargon comes confusion and misunderstanding. 2022 saw a huge rise in the popularity of the buzz-word “Red Team”, but what is the essence of a Red Team? Popular opinion on social media may say “it’s a pentest with no scope,” but that’s a...
by TCMS Staff | Nov 14, 2022 | Security
MFA stands for Multi-Factor Authentication. Microsoft helps clarify MFA as an additional step in the authentication process, “You need a second thing – what we call a second “factor” – to prove who you are.” When logging into your...
by TCMS Staff | Nov 8, 2022 | Penetration Testing, Security
Our last blog post regarding OSINT and Recon briefly discussed some exciting topics. In this blog post, we will continue with that thread and discuss some tradecrafts used by investigators and Pentesters. Only some investigators and pentesters utilize these exact...
by TCMS Staff | Sep 29, 2022 | Penetration Testing, Security
OSINT OSINT stands for Open-Source Intelligence. It is the action of gathering information that is publicly available and analyzing it for intelligence purposes. First, let’s look at what type of data can be considered Open-Source. Data or information...