• @[email protected]
    link
    fedilink
    English
    161 year ago

    This is the backdoor that’s deployed after a host is compromised. How the host is compromised is somewhat irrelevant. It could be exploited manually, social engineering, a worm, etc.