well there are multiple ways to do it wheather it be telnet,ftp, authorization remote desktop bypass,trojans

it just depends on what fits u the most