🎌 Post-Exploitation

No post-exploitation persistence or lateral movement was required. The primary objective was retrieving the system flag, which was located in the root user’s home directory.