RE

Type your comment> @Sp3eD said:

Type your comment> @farbs said:

Rooted! And had a great time with it, too. Pretty cool concept for a box :slight_smile:

Here are some hints for user/root:

User
Make sure you pay attention to the service that is running on the higher port. There’s one in particular that you can abuse specifically. As was mentioned above, it is rather realistic and closely related to phishing tactics.

Root
Extract. Pay attention to what is relative. Afterwards, you can abuse a service to act as who you want to be.

I did the machine and got root … but I don’t really understand your hints!!

There’s more than one method, my friend :slight_smile: