Navigate the digital labyrinth. Use real Linux commands (cd, ls, sudo, chmod) to manipulate the file system, unlock secure vaults, and defeat system defenses.