If you’re lucky enough to find a command execution vulnerability during a penetration test, pretty soon afterward [...]