Remote login program

Attacker toolkits often contain '''remote login program]]s such as SSH and telnet that can be used to log in to other systems remotely. Attackers can use these programs for many purposes, such as controlling compromised systems and transferring data between systems.