Spin up a hardened virtual machine (Whonix) and chain a multihop VPN (ProtonVPN)to breach the network
Use servers in Asia and Europe, exiting through a residential proxy from a UK ISP, looking like a local user blending in with US traffic.
Encrypt DNS queries with DOT port 853 or DOH port 443 (better) via Cloudflare, mimicking HTTPS traffic. Hiding our probes from their firewalls to avoid network monitoring
Scan for vulnerable edge servers with Nmap T2 timing to find unpatched web servers to identify entry points.
Exploit Apache flaws with a Metasploit reverse TCP shell to access their backend DMZ, gaining internal system control
Exfiltrate data and POST requests 100 bytes each, sent every 15 seconds to a burner domain that you will register. Covertly retrieving confidential files.