• Quibblekrust@thelemmy.club
      link
      fedilink
      English
      arrow-up
      8
      ·
      13 hours ago

      First, you break into the house, then you install an invisible backdoor, and then you can come and go freely.

      It’s a “post-exploit” tool. It’s the persistent backdoor you install after you break in. It survives reboots, unlike most exploits.

      • blobjim [he/him]@hexbear.net
        link
        fedilink
        English
        arrow-up
        1
        ·
        7 hours ago

        ah I guess that’s exactly what a backdoor is. I read the headline and thought security vulnerability or privilege escalation.