Tech Couch

A Comfy Corner for Software, Security, Cloud, and AI

security

Setting up port knocking for SSH

Hiding important services from unauthorized eyes

Modern backup management with restic

Reliable backups from storage to recovery

Web security fuzzing with gobuster

Finding accidentally exposed files

Hardening sudo against privilege ecalation attacks

Preventing privilege escalation through privileged commands

Penetration testing reconnaissance for web targets

How security professionals evaluate a website

An overview of C2PA

Adding more metadata to images

Detecting suspicious filesystem changes with aide

Keeping track of changes made by intruders

Finding common bugs with valgrind

From memory leaks to race conditions

How attackers hide backdoors in web servers

Understand and detect post-exploitation changes

Breaking out of docker containers

How misconfigurations lead to privilege escalation