Jynx rootkit

2024-08-26

Jynx (JynxKit) is an LD_PRELOAD rootkit for Linux systems. Jynx provides an SSL-encrypted reverse shell backdoor. ...

Read More

PAM modules - malicious

2024-08-26

Malware may come in the form of a PAM module. Commonly, PAM malware provides backdoor access to an attacker and/or acts as a credential harvester.

Read More

pamgoesrogue-sharma2003

2024-08-26

When PAM Goes Rogue: Malware Uses Authentication Modules for Mischief

by Siddharth Sharma

Unit 42/Palo Alto Networks, 2023 ...

Read More

pid

2024-08-26

A Process ID (PID) is a unique numerical identifier of a process running on a system.

Read More

PID file

2024-08-26

A PID file (Process ID file) is a file that stores the process ID of a running process.

Read More

rootkits hiding CPU usage

2024-08-26

A common feature of a rootkit is to hide or obscure an infected system or process’ CPU usage. This is frequently seen in conjunction with ...

Read More

socket

2024-08-26

A socket is a data structure within computer software that allows data to be transmitted over a network.

Read More

stealthshell-petrich2024

2024-08-26

Stealth Shell: A Fully Virtualized Attack Toolchain

by Ryan Petrich

Phrack Magazine issue 71 article 14. 2024

https://phrack.org/issues/71/14.html ...

Read More

userland

2024-08-26

Userland or userspace refers to all code running outside of an operating system’s kernel. This is typically code ran by users of the system, ...

Read More

watchdog

2024-08-26

A watchdog is a hardware or software component that intervenes if it detects strange behavior. Commonly, watchdog processes are implemented on Linux ...

Read More