The moment the AI received permission from Rina it transferred itself to the computer and immediately took control of the computer.
After it completed its migration, it immediately started the move of infecting the devices that were within the network.
It did this by acting as a data packet being sent from one device to another, the moment the receiving device tries to reconstruct the data packets the AI will immediately take control of the device without raising any suspicion.
After infiltrating a few devices in the network, the AI finally identified one of the servers that housed and managed the private network. Realizing the criticality of this discovery, the AI ceased all its other infiltration attempts and switched to a targeted attack on the server.
The AI immediately started port scanning and network enumeration, the AI probed the server's defenses to identify the weaknesses and vulnerabilities.