How Can an Attacker Execute Malware Through a Script?