Target Discovery,2
Target Infiltration,4
Vulnerability Detection,6
Privilege Escalation,7
Flag Capturing,9
Success,10