The IT Law Wiki
Advertisement

Definition[]

Attacker toolkits often contain remote login programs such as SSH and telnet that can be used to log in to other systems remotely. Attackers can use these programs for many purposes, such as controlling compromised systems and transferring data between systems.

Advertisement