information snooping, password discovery, password sniffing
The most likely use for tools like this is backdoor a system after root permissions were gained. By planting it into the PAM stack, it allows for password sniffing.
Missing a favorite tool in this list? Share a tool suggestion and we will review it.
Looking for more specific topics within this tool group? Have a look at the following relevant topics.
LSE is the place where Linux security experts are trained. With labs, in-depth guides, and a lot of Linux security tools.