This recipe will demonstrate how to use Bash to exploit a single vulnerability across multiple systems and add a new administrator account on each system. This technique can be used to access compromised systems at a later time using integrated terminal services or SMB authentication.