Tech Couch

A Comfy Corner for Software, Security, Cloud, and AI

security

Web security fuzzing with gobuster

Finding accidentally exposed files

Hardening sudo against privilege ecalation attacks

Preventing privilege escalation through privileged commands

Penetration testing reconnaissance for web targets

How security professionals evaluate a website

An overview of C2PA

Adding more metadata to images

Detecting suspicious filesystem changes with aide

Keeping track of changes made by intruders

Finding common bugs with valgrind

From memory leaks to race conditions

How attackers hide backdoors in web servers

Understand and detect post-exploitation changes

Breaking out of docker containers

How misconfigurations lead to privilege escalation

How malicious software uses dynamic linking to evade detection

When even linux system utilities lie to you