If a person is able to read (but not modify) the /etc/duo/pam_duo.conf file of a Linux server (which they may or may not already be authorised to access via SSH), what can this information be used to achieve?
For example, is it possible for such a pe...