Black Hills InfoSec - The “P” in PAM is for Persistence: Linux Persistence Technique

Learn about a pentesting tool using the Pluggable Authentication Module for privilege escalation, lateral movement, and persistence in Linux.
The post The “P” in PAM is for Persistence: Linux Persistence Technique appeared first on Black Hills Information Security, Inc..
from Black Hills Information Security, Inc. https://www.blackhillsinfosec.com/the-p-in-pam-is-for-persistence-linux-persistence-technique/
Comments
Post a Comment