The decades-old "finger" command is making a comeback,, with threat actors using the protocol to retrieve remote commands to ...
'.txt': 'Documents/Text', '.rtf': 'Documents/Text', '.odt': 'Documents/Text', '.xlsx': 'Documents/Spreadsheets', '.csv': ...