☆ Yσɠƚԋσʂ ☆@lemmy.ml to Linux@lemmy.mlEnglish · 2 days agoNew Linux PamDOORa Backdoor Uses PAM Modules to Steal SSH Credentialsthehackernews.comexternal-linkmessage-square15linkfedilinkarrow-up165arrow-down13
arrow-up162arrow-down1external-linkNew Linux PamDOORa Backdoor Uses PAM Modules to Steal SSH Credentialsthehackernews.com☆ Yσɠƚԋσʂ ☆@lemmy.ml to Linux@lemmy.mlEnglish · 2 days agomessage-square15linkfedilink
minus-squareblobjim [he/him]@hexbear.netlinkfedilinkEnglisharrow-up13·2 days agoHow is this a backdoor if it requires being able to install custom PAM modules???
minus-squareQuibblekrust@thelemmy.clublinkfedilinkEnglisharrow-up11·1 day agoFirst, you break into the house, then you install an invisible backdoor, and then you can come and go freely. It’s a “post-exploit” tool. It’s the persistent backdoor you install after you break in. It survives reboots, unlike most exploits.
minus-squareblobjim [he/him]@hexbear.netlinkfedilinkEnglisharrow-up1·1 day agoah I guess that’s exactly what a backdoor is. I read the headline and thought security vulnerability or privilege escalation.
How is this a backdoor if it requires being able to install custom PAM modules???
First, you break into the house, then you install an invisible backdoor, and then you can come and go freely.
It’s a “post-exploit” tool. It’s the persistent backdoor you install after you break in. It survives reboots, unlike most exploits.
ah I guess that’s exactly what a backdoor is. I read the headline and thought security vulnerability or privilege escalation.