@Sh1ftContr0l in order they’re listed in. You start with Archetype, then do all ones from the list, one after the other. If there is a post-exploitation step after you found root.txt
that’s the bit that’s going to be useful in the next machine.
@Sh1ftContr0l in order they’re listed in. You start with Archetype, then do all ones from the list, one after the other. If there is a post-exploitation step after you found root.txt
that’s the bit that’s going to be useful in the next machine.