Objective: Gather intel on the enemy's security protocols and identify vulnerabilities for Phase 2.
Location: Server Node 5, Sub-Node 3, Sector 2
Team Leader: Agent "B" (aka "The Shadow Weaver")
Team Members: Agent "A" (aka "The Whiz Kid"), Agent "C" (aka "The Gizmo")
Equipment:
Phase 1, Node 2: Infiltration Case Study
Scan the server's perimeter fence for weaknesses in the security system.