passwords can be stolen in a number of ways and abused by an attacker.
Some of these techniques may include:
- shoulder surfing
- keylogger malware
- network sniffing
- social engineering
- cracking stolen hashes
password theft
0001-01-01
passwords can be stolen in a number of ways and abused by an attacker.
Some of these techniques may include:
Linux Persistence: Modular Software
2025-04-17 DFIR CTF persistence linux persistence apache asterisk
Linux Persistence: Web Shells
2025-04-16 DFIR persistence webshell linux persistence webshell apache nginx PHP
Linux Persistence: Rootkits
2025-04-15 DFIR persistence rootkit LKM linux persistence LKM rootkit LD_PRELOAD kprobe ftrace ld.so hooking
Defanging Linux LKM Rootkits With cleanup_module()
2025-04-05 Linux LKM rootkits EDR hooks incident response Linux LKM rootkit