☆ Yσɠƚԋσʂ ☆@lemmy.ml to Linux@lemmy.mlEnglish · 3 天前New Linux PamDOORa Backdoor Uses PAM Modules to Steal SSH Credentialsthehackernews.comexternal-linkmessage-square16fedilinkarrow-up169cross-posted to: linux@programming.dev
arrow-up169external-linkNew Linux PamDOORa Backdoor Uses PAM Modules to Steal SSH Credentialsthehackernews.com☆ Yσɠƚԋσʂ ☆@lemmy.ml to Linux@lemmy.mlEnglish · 3 天前message-square16fedilinkcross-posted to: linux@programming.dev
minus-squareQuibblekrust@thelemmy.clublinkfedilinkEnglisharrow-up12·3 天前First, you break into the house, then you install an invisible backdoor, and then you can come and go freely. It’s a “post-exploit” tool. It’s the persistent backdoor you install after you break in. It survives reboots, unlike most exploits.
minus-squareblobjim [he/him]@hexbear.netlinkfedilinkEnglisharrow-up1·2 天前ah I guess that’s exactly what a backdoor is. I read the headline and thought security vulnerability or privilege escalation.
First, you break into the house, then you install an invisible backdoor, and then you can come and go freely.
It’s a “post-exploit” tool. It’s the persistent backdoor you install after you break in. It survives reboots, unlike most exploits.
ah I guess that’s exactly what a backdoor is. I read the headline and thought security vulnerability or privilege escalation.