Le shell permet de quasiment tout faire ; pourquoi ne pas tout expliquer par le Shell :

everybody@worldsupremacy$ ssh laden@home
laden@home$ sudo mv kamikz /home/usa
Password:
laden@home$ ssh kamikz@usa
kamikz@usa$ mv /home/usa/planes /home/usa/worldTrade/center
kamikz@usa$ rm -rf /home/usa/worldTrade
kamikz@usa$ logout
laden@home$ logout
everybody@worldsupremacy$ ssh usa@home
usa@home$ locate laden
usa@home$ ssh usa@irak "find /home -name laden"
usa@home$ ssh usa@afganistan "find /home -name laden"
usa@home$ ssh usa@pakistan  "find /home -name laden"
usa@pakistan's password:
find: "/home": Permission denied
usa@home$ ssh seals@pakistan
seals@pakistan's password:
Permission denied, please try again.
seals@pakistan's password: 
Permission denied, please try again.
seals@pakistan's password: 
Permission denied (publickey,gssapi-keyex,gssapi-with-mic,password).
usa@home$ ssh seals@pakistanBackDoor
ssh: connect to host pakistanBackDoor port 22: Connection refused
usa@home$ cat operation.txt
 + Operation Neptune's Spear
 + Kill  Geronimo
 + Take photos
 + Be nice
usa@home$ grep -i way /etc/services | grep spear
spearway	2440/udp    # Spearway Lockers
spearway	2440/tcp    # Spearway Lockers
usa@home$ ssh -p 2440 -R3615:localhost:22 seals@pakistanBackDoor
seals@pakistanBackDoor's password:
seals@pakistanBackDoor$ cd /bin
seals@pakistanBackDoor$ killall -TERM laden
seals@pakistanBackDoor$ import -window root bin_laden_ScreenHeadShot.png
seals@pakistanBackDoor$ scp -P3615 bin_laden_ScreenHeadShot.png usa@localhost:
usa@localhost's password:
seals@pakistanBackDoor$ mv /bin/laden /usr/games/fillets
seals@pakistanBackDoor$ ln -s /usr/games/fillets /usr/games/fishFilletsNG
seals@pakistanBackDoor$ logout
usa@home$ scp usa@pakistan:./bin_laden_ScreenHeadShot.png /dev/null
usa@pakistan's password: 
everybody@worldsupremacy$ logout