Auth Log Backdoor
By contaminating the auth.log
file in Linux /var/log
directory we can setup a backdoor and use it to execute remote commands.
LISTEN:
EXECUTE REMOTE COMMAND:
Last updated
By contaminating the auth.log
file in Linux /var/log
directory we can setup a backdoor and use it to execute remote commands.
LISTEN:
EXECUTE REMOTE COMMAND:
Last updated