Jynx rootkit
2024-08-26
Jynx (JynxKit) is an LD_PRELOAD rootkit for Linux systems. Jynx provides an SSL-encrypted reverse shell backdoor. ...
Read More
PAM modules - malicious
2024-08-26
Malware may come in the form of a PAM module. Commonly, PAM malware provides backdoor access to an attacker and/or acts as a credential harvester.
Read More
pamgoesrogue-sharma2003
2024-08-26
When PAM Goes Rogue: Malware Uses Authentication Modules for Mischief
by Siddharth Sharma
Unit 42/Palo Alto Networks, 2023 ...
Read More
pid
2024-08-26
A Process ID (PID) is a unique numerical identifier of a process running on a system.
Read More
PID file
2024-08-26
A PID file (Process ID file) is a file that stores the process ID of a running process.
Read More
rootkits hiding CPU usage
2024-08-26
A common feature of a rootkit is to hide or obscure an infected system or process’ CPU usage. This is frequently seen in conjunction with ...
Read More
socket
2024-08-26
A socket is a data structure within computer software that allows data to be transmitted over a network.
Read More
stealthshell-petrich2024
2024-08-26
Stealth Shell: A Fully Virtualized Attack Toolchain
by Ryan Petrich
Phrack Magazine issue 71 article 14. 2024
https://phrack.org/issues/71/14.html ...
Read More
userland
2024-08-26
Userland or userspace refers to all code running outside of an operating system’s kernel. This is typically code ran by users of the system, ...
Read More
watchdog
2024-08-26
A watchdog is a hardware or software component that intervenes if it detects strange behavior. Commonly, watchdog processes are implemented on Linux ...
Read More