Research Update Enhanced src/linux-hardening/linux-post-expl...#2123
Merged
carlospolop merged 1 commit intomasterfrom Apr 13, 2026
Conversation
Collaborator
Author
🔗 Additional ContextOriginal Blog Post: Content Categories: Based on the analysis, this content was categorized under "Research". Repository Maintenance:
Review Notes:
Bot Version: HackTricks News Bot v1.0 |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
🤖 Automated Content Update
This PR was automatically generated by the HackTricks News Bot based on a technical blog post.
📝 Source Information
🎯 Content Summary
Research Update for src/linux-hardening/linux-post-exploitation/pam-pluggable-authentication-modules.md
This PR contains automated research updates including:
Generated by: HackTricks Research Agent
Timestamp: 2026-04-13 03:36:41 UTC
Tool usage
🔧 Technical Details
Research update for HackTricks content
🤖 Agent Actions
I’m reading the current PAM page and nearby Linux post-exploitation docs first, then I’ll branch into recent research sources to identify what’s genuinely missing versus already covered elsewhere.
The page is narrower than expected: it covers classic
pam_unix.sotrojaning and a smallpam_execpersistence note, but it doesn’t cover newer Linux-PAM supply-chain angles, module search-path abuse, or stack-control semantics that matter for backdooring cleanly.I’ve mapped related HackTricks content. The overlapping material is mostly in
linux-post-exploitation/README.md, so I’m keeping this page focused on PAM-specific operator techniques rather than re-explaining generic post-exploitation persistence.I have enough source material to tighten this page around techniques that are both current and specific to PAM: stack semantics abuse,
pam_exectoken handling, distro-specific module paths, and the recent “malicious PAM module posing as legit auth” pattern seen in 2025 threat reporting.I’m editing the PAM page now. The changes will stay compact: one section on stack/path abuse and one section on
authselect/recent tradecraft, without bloating the page into a generic Linux persistence article.The file is updated. I’m doing a final pass now for HackTricks style, technical correctness, and whether the new references are minimal and placed only at the end.
Updated pam-pluggable-authentication-modules.md.
I added PAM-specific material that was missing but still fits the page scope: offensive stack semantics (
include,substack, bracketed controls, relative vs absolutemodule-path), a more accuratepam_execabuse section withexpose_authtok/PAM env details,authselect-aware persistence on RHEL-family systems, and a short note on 2025 PAM backdoor tradecraft (Plague) focused on operator-relevant behavior rather than CVE-style narrative. I also replaced the stale references with two current, more useful ones at the end of the file.Verification was manual via file review and
git diff.markdownlintwas not installed in the environment, so I could not run an automated markdown lint pass.Research URLs used:
This PR was automatically created by the HackTricks Feed Bot. Please review the changes carefully before merging.