• Quibblekrust@thelemmy.club
    link
    fedilink
    English
    arrow-up
    10
    ·
    20 hours ago

    First, you break into the house, then you install an invisible backdoor, and then you can come and go freely.

    It’s a “post-exploit” tool. It’s the persistent backdoor you install after you break in. It survives reboots, unlike most exploits.

    • blobjim [he/him]@hexbear.net
      link
      fedilink
      English
      arrow-up
      1
      ·
      14 hours ago

      ah I guess that’s exactly what a backdoor is. I read the headline and thought security vulnerability or privilege escalation.