The "finger" command remains exploitable for remote code execution even after years of disuse Attackers use batch scripts to channel server responses directly into Windows command sessions Hidden ...