• Quibblekrust@thelemmy.club
    link
    fedilink
    English
    arrow-up
    1
    ·
    10 hours ago

    First, you break into the house, then you install an invisible backdoor, and then you can come and go freely.

    It’s a “post-exploit” tool. It’s the persistent backdoor you install after you break in. It survives reboots, unlike most exploits.