As part of an exercise, I am targeting a Linux system deployed in a very unusual and restricted networking environment. Among other things, there is no traditional networki