Post Connection Attacks - Writing Custom Scripts To Execute Own Attacks - Generating Trojans - Installing The Trojan Factory