PAM backdoors

Tools

sshLooter (PAM backdoor for SSH)

information snooping, password discovery, password sniffing

The most likely use for tools like this is backdoor a system after root permissions were gained. By planting it into the PAM stack, it allows for password sniffing.

Missing a favorite tool in this list? Share a tool suggestion and we will review it.