☆ Yσɠƚԋσʂ ☆@lemmy.ml to Linux@lemmy.mlEnglish · 15 hours agoNew Linux PamDOORa Backdoor Uses PAM Modules to Steal SSH Credentialsthehackernews.comexternal-linkmessage-square9fedilinkarrow-up13arrow-down10
arrow-up13arrow-down1external-linkNew Linux PamDOORa Backdoor Uses PAM Modules to Steal SSH Credentialsthehackernews.com☆ Yσɠƚԋσʂ ☆@lemmy.ml to Linux@lemmy.mlEnglish · 15 hours agomessage-square9fedilink
minus-squareblobjim [he/him]@hexbear.netlinkfedilinkEnglisharrow-up2·12 hours agoHow is this a backdoor if it requires being able to install custom PAM modules???
minus-squareQuibblekrust@thelemmy.clublinkfedilinkEnglisharrow-up1·10 hours agoFirst, you break into the house, then you install an invisible backdoor, and then you can come and go freely. It’s a “post-exploit” tool. It’s the persistent backdoor you install after you break in. It survives reboots, unlike most exploits.
How is this a backdoor if it requires being able to install custom PAM modules???
First, you break into the house, then you install an invisible backdoor, and then you can come and go freely.
It’s a “post-exploit” tool. It’s the persistent backdoor you install after you break in. It survives reboots, unlike most exploits.