Figure6

Figure6

Figure 6 - Examples of backdoor commands