Watch this video on YouTube
What should be your first action when attempting to exploit a vulnerable service in a simulated AI-powered environment?