Use the display module, or the commands "cd [Foldername]" and "cat [Filename]" to navigate and read files. Delete files using "rm [Filename]" The Tab key can be used to autocomplete commands and filenames.
Use Probe to see what ports are open. Target one with a program and target the correct port I.E: "SSHCrack 22" ^filename ^portnumber Breaking sufficient ports leaves the target vulnerable to a security breach using "Porthack".
A few notes on Proxy servers - a classic Entropy challenge. Run shells on computers you have admin access to with "Shell". Connect to a target computer, probe it's security. Use the shells to overload target proxy. NetEdu Archives will have more details.