Tech Couch

A Comfy Corner for Software, Security, Cloud, and AI

security

Penetration testing reconnaissance for web targets

How security professionals evaluate a website

An overview of C2PA

Adding more metadata to images

Detecting suspicious filesystem changes with aide

Keeping track of changes made by intruders

Finding common bugs with valgrind

From memory leaks to race conditions

How attackers hide backdoors in web servers

Understand and detect post-exploitation changes

Breaking out of docker containers

How misconfigurations lead to privilege escalation

How malicious software uses dynamic linking to evade detection

When even linux system utilities lie to you

Manual web application fingerprinting

Understanding what information attackers are looking for

Automated security hardening on RockyLinux with OpenSCAP

Securing enterprise linux in less than a minute