|This article does not cite any references or sources. (December 2009)|
This is typically accomplished by scanning broad IP address ranges with port scanners in search of servers running open ports that are vulnerable to attack by various scripts (e.g. CGI, PHP, VNC, etc.). The scripts are utilized to gain entry into the server whereupon the cracker uploads server software and creates logins. Many crackers will then patch the server against the very vulnerabilities they utilized to compromise the system thereby protecting it from being hijacked by other FXP groups.