So far, when we run a new exploit it exploits the current "vulnerable points" obtained by performing an API request when it's run. Since there are previous flags that are not expired yet, we could exploit them as well, to do that we need to save previous API requests (see #7) and pass them to the new exploit, of course we don't need to pass ALL the previous requests but just the requests that contain vulnerable points relative to a certain ip.
So far, when we run a new exploit it exploits the current "vulnerable points" obtained by performing an API request when it's run. Since there are previous flags that are not expired yet, we could exploit them as well, to do that we need to save previous API requests (see #7) and pass them to the new exploit, of course we don't need to pass ALL the previous requests but just the requests that contain vulnerable points relative to a certain ip.