Irked

@ZaphodBB said:
Honestly - everything you need for foothold, user and root is in this thread

Foothold - enumerate properly - check all ports , then use google

User - again enumerate properly. Specifically for things you cant see straight away. When you find something interesting all the information you need is there - its staring you right in the face

Root - Enumerate again, look for files that can be exploited then look again for something you may not find in a standard Linux installation

Couldn’t agree more. Root is just about paying attention