☆ Yσɠƚԋσʂ ☆@lemmy.ml to Linux@lemmy.mlEnglish · 3 days agoNew Linux PamDOORa Backdoor Uses PAM Modules to Steal SSH Credentialsthehackernews.comexternal-linkmessage-square16linkfedilinkarrow-up171arrow-down13
arrow-up168arrow-down1external-linkNew Linux PamDOORa Backdoor Uses PAM Modules to Steal SSH Credentialsthehackernews.com☆ Yσɠƚԋσʂ ☆@lemmy.ml to Linux@lemmy.mlEnglish · 3 days agomessage-square16linkfedilink
minus-squareQuibblekrust@thelemmy.clublinkfedilinkEnglisharrow-up12·3 days agoFirst, you break into the house, then you install an invisible backdoor, and then you can come and go freely. It’s a “post-exploit” tool. It’s the persistent backdoor you install after you break in. It survives reboots, unlike most exploits.
minus-squareblobjim [he/him]@hexbear.netlinkfedilinkEnglisharrow-up1·3 days agoah I guess that’s exactly what a backdoor is. I read the headline and thought security vulnerability or privilege escalation.
First, you break into the house, then you install an invisible backdoor, and then you can come and go freely.
It’s a “post-exploit” tool. It’s the persistent backdoor you install after you break in. It survives reboots, unlike most exploits.
ah I guess that’s exactly what a backdoor is. I read the headline and thought security vulnerability or privilege escalation.