Phase 1: Infiltration

Known vulnerabilities: a laundry list of mistakes waiting to happen.

Subprotocol Flaws

Subphase 1.1: Password Policy

Because who needs passwords, really?

Next phase: Phase 1.2: Data Exfiltration