A Comfy Corner for Software, Security, Cloud, and AI
Finding accidentally exposed files
Preventing privilege escalation through privileged commands
How security professionals evaluate a website
Adding more metadata to images
Keeping track of changes made by intruders
From memory leaks to race conditions
Understand and detect post-exploitation changes
How misconfigurations lead to privilege escalation
But you should use them anyway
When even linux system utilities lie to you