Writeup

@govsec said:

You are correct to use that tool. What will matter next is the attack and hash you will use. Dont forget the “stone” cause the pass is there

Thanks, I ended up doing it with the exploit itself and the queen song wordlist.

Now stuck on root. See the processes with pspy but don’t know what to do with them.