🛠️ Step 1: Initial Network Poisoning & Traffic Capture

🔍 Step 2: Network & Host Enumeration

🔑 Step 3: Exploiting Web-Based Targets

📌 Step 4: Lateral Movement & Privilege Escalation