When you’re a terrible person breaking into a system, the primary issue you have to settle is, obviously, getting into the remote framework and running your malware on