1. Challenge Information
2. TL;DR Solution Summary
3. Recon / Initial Analysis
4. Vulnerability Breakdown
5. Exploitation
6. Final Output
7. Key Takeways
8. Appendix (Optional)