Kernel Config Checker now checks kernel boot parameters. Make sure your cmdline isn’t disabling security features.
Posts for: #Security
Kernel Hardening Part 2 — Check Your Sysctl Settings
Kernel Config Checker now supports sysctl. Check your kernel runtime settings without recompiling.
Path Traversal — How Attackers Read Files from Your Server
What is path traversal, how it works, bypass techniques attackers use, and how to defend against it.
Linux 7.0 — What Does the New Version Number Change?
Overview of Linux 7.0 kernel changes — Rust officially in the kernel, memory management improvements, scheduler, new drivers, HIPPI removal and more.
REST API — HTTP Method Override and Its Consequences
How to override HTTP methods in flight, why it works, and what the security consequences are for REST APIs.
Kernel Hardening — Check Your Kernel Security in 30 Seconds
How to quickly check if your kernel configuration is secure. Upload your .config file and see what needs fixing.
What’s New in Linux Kernel 6.19?
An overview of the most important changes in Linux kernel 6.19 — Live Update, the new listns() syscall, Btrfs and ext4 improvements, HDR, io_uring, and Rust in the kernel.
Volatility 3 — Linux Memory Dump Analysis Guide
Volatility 3 — the rewritten RAM analysis framework. No more profiles, new linux.* plugin syntax, installation, and a practical incident analysis example.
Volatility — Linux RAM Forensics and Analysis
Introduction to Volatility — a framework for analyzing RAM dumps. Profiles, plugins, and a practical example of analyzing a compromised Linux server.
Wazuh SIEM on Linux — Security Monitoring Guide
What is Wazuh and how to use it for Linux server security monitoring. FIM, vulnerability detection, log analysis, Active Response, and Suricata integration.