☆ Yσɠƚԋσʂ ☆@lemmy.ml to Linux@lemmy.mlEnglish · 1 day agoNew Linux PamDOORa Backdoor Uses PAM Modules to Steal SSH Credentialsthehackernews.comexternal-linkmessage-square14linkfedilinkarrow-up160arrow-down13
arrow-up157arrow-down1external-linkNew Linux PamDOORa Backdoor Uses PAM Modules to Steal SSH Credentialsthehackernews.com☆ Yσɠƚԋσʂ ☆@lemmy.ml to Linux@lemmy.mlEnglish · 1 day agomessage-square14linkfedilink
minus-squareQuibblekrust@thelemmy.clublinkfedilinkEnglisharrow-up10·19 hours agoFirst, you break into the house, then you install an invisible backdoor, and then you can come and go freely. It’s a “post-exploit” tool. It’s the persistent backdoor you install after you break in. It survives reboots, unlike most exploits.
minus-squareblobjim [he/him]@hexbear.netlinkfedilinkEnglisharrow-up1·14 hours agoah I guess that’s exactly what a backdoor is. I read the headline and thought security vulnerability or privilege escalation.
First, you break into the house, then you install an invisible backdoor, and then you can come and go freely.
It’s a “post-exploit” tool. It’s the persistent backdoor you install after you break in. It survives reboots, unlike most exploits.
ah I guess that’s exactly what a backdoor is. I read the headline and thought security vulnerability or privilege escalation.