Phase 1, Node 2: Infiltrating the Enemy's Server

Objective: Gather intel on the enemy's security protocols and identify vulnerabilities for Phase 2.

Location: Server Node 5, Sub-Node 3, Sector 2

Team Leader: Agent "B" (aka "The Shadow Weaver")

Team Members: Agent "A" (aka "The Whiz Kid"), Agent "C" (aka "The Gizmo")

Equipment:

Phase 1, Node 2: Infiltration Case Study

Sub-Phase 1.1: Reconnaissance

Scan the server's perimeter fence for weaknesses in the security system.

  1. Identify the type of wire mesh used for the fence
  2. Analyze the frequency of patrols and guard rotations
Proceed to Phase 1.2: Infiltration