Before proceeding with the simulation, every operative must understand the legal and moral boundaries of Cybersecurity.
Never attempt to penetrate a system without explicit, written permission from the owner. In this lab, your "permission" is the lesson assignment.
If you encounter sensitive personal data (PII) during a test, you must stop and report it immediately. Do not copy or distribute it.
A "Scope" defines what you are allowed to touch. In this lab, your scope is internal_node_01. Attacking the website hosting this lab is out-of-scope.