Which of the following is a common way for an attacker to spread from one compromised system to another?