Tagged: Exploit

Exploit Linux PAM

How Attackers Exploit PAM’s Modular Design on Linux

The Linux ecosystem offers its users a comprehensive method for user access and authorization through the Pluggable Authentication Modules (PAM). But what exactly is PAM and why should you be concerned about its security...

IoT Exploitation Framework

Expliot v0.10 releases: Internet Of Things Exploitation Framework

Internet Of Things Exploitation Framework Expliot is a framework for security testing IoT and IoT infrastructure. It provides a set of plugins (test cases) and can be extended easily to create new plugins. Changelog...