🎌 Post-Exploitation

No post-exploitation was required. The objective was completed by retrieving the flag from the web application’s dashboard.