Dec. 20, 2022, 8:58 a.m. | Jay Vadhaiya

InfoSec Write-ups - Medium infosecwriteups.com

TCM Security “Academy” — Walkthrough

Walkthrough on TCM Security Academy machine challenge

Greetings of the day everyone. In today’s article we are going to walkthrough one of best machines of TCM Security Capstone Challenges from Practical Ethical Hacking Course. I am using VMWare Workstation as a hypervisor technology, Kali Linux as a attacking machine and academy vulnerable machine as a victim.

Academy.7z

You can download and setup the environment as we are not focusing on the environment setup and installation. …

academy ctf cybersecurity ethical hacking infosec security tcm-security

Senior Security Engineer

@ LiquidX | Singapore, Central Singapore, Singapore

Application Security Engineer

@ Solidigm | Zapopan, Mexico

Application Security Engineer

@ Yassir | worldwide

Senior Windows Threat & Detection Security Researcher (Cortex)

@ Palo Alto Networks | Tel Aviv-Yafo, Israel

MDR Security Analyst

@ SentinelOne | Israel

Principal Security Research Engineer (Prisma Cloud)

@ Palo Alto Networks | Bengaluru, India