Compromising the existing system and application files for remote access