☆ Yσɠƚԋσʂ ☆@lemmy.ml to Linux@lemmy.mlEnglish · 15 hours agoNew Linux PamDOORa Backdoor Uses PAM Modules to Steal SSH Credentialsthehackernews.comexternal-linkmessage-square11linkfedilinkarrow-up149arrow-down13cross-posted to: linux@programming.dev
arrow-up146arrow-down1external-linkNew Linux PamDOORa Backdoor Uses PAM Modules to Steal SSH Credentialsthehackernews.com☆ Yσɠƚԋσʂ ☆@lemmy.ml to Linux@lemmy.mlEnglish · 15 hours agomessage-square11linkfedilinkcross-posted to: linux@programming.dev
minus-squareQuibblekrustlinkfedilinkEnglisharrow-up8·9 hours agoFirst, you break into the house, then you install an invisible backdoor, and then you can come and go freely. It’s a “post-exploit” tool. It’s the persistent backdoor you install after you break in. It survives reboots, unlike most exploits.
minus-squareblobjim [he/him]@hexbear.netlinkfedilinkEnglisharrow-up1·4 hours agoah I guess that’s exactly what a backdoor is. I read the headline and thought security vulnerability or privilege escalation.
First, you break into the house, then you install an invisible backdoor, and then you can come and go freely.
It’s a “post-exploit” tool. It’s the persistent backdoor you install after you break in. It survives reboots, unlike most exploits.
ah I guess that’s exactly what a backdoor is. I read the headline and thought security vulnerability or privilege escalation.