1. Challenge Information

2. TL;DR Solution Summary

3. Recon / Initial Analysis

4. Vulnerability Breakdown

5. Exploitation

6. Final Output

7. Key Takeways

8. Appendix (Optional)