Tech Couch

A Comfy Corner for Software, Security, Cloud, and AI

security

Finding common bugs with valgrind

From memory leaks to race conditions

How attackers hide backdoors in web servers

Understand and detect post-exploitation changes

Breaking out of docker containers

How misconfigurations lead to privilege escalation

How malicious software uses dynamic linking to evade detection

When even linux system utilities lie to you

Manual web application fingerprinting

Understanding what information attackers are looking for

Automated security hardening on RockyLinux with OpenSCAP

Securing enterprise linux in less than a minute

Brute-forcing logins with hydra: Attack and defense

How an attacker would crack a login, and how to protect against it

Protecting linux servers from malware with ClamAV and rkhunter

Finding malicious files the open source way

Resetting Windows passwords from linux

Regain control of your windows 7/8/10/11 pc with just a few commands