User Accessing Root...
Extracting Sensitive Information...
Cracking Encrypted Files...
Bypassing Firewall Security...
Deleting Digital Footprints...
Navigating to Root Directory...
Listing Contents...