Malware may come in the form of a PAM module. Commonly, PAM malware provides backdoor access to an attacker and/or acts as a credential harvester.
PAM modules - malicious
2024-08-26
Recent Posts
Linux Persistence: atd
2025-04-01 DFIR CTF linux persistence at atd
Linux Persistence: SSH
2025-03-29 DFIR CTF SSH hardening hunting persistence linux persistence hunting hardening SSH PAM