Get Demo
The wall daemon can be used for denial of service, social engineering attacks, or to execute remote commands.