Registry

well this machine its really interesting.

enumeration was really easy, lucky me, in past days a was reading about vulnerabilities in d***** so, obtain access to shell was easy after found the first 3 files, user 2 ■■■, really good challenge, i used a backdoor through my first con, and finally root, Good Lord, after read the manual and view the command was not sure if DIY apply so I ask to other users but the answer not was really usefull.

well this is my hints.

Start → the challenge is make technology your friend, this is friendly if you ask.
User1 → The funny thing is with the enum you obtain this access just puth J*** to work.
User2 → Now i can see other ways, but in fact, for my i took the easy to backdooring my connection, think about it, if front is bloked so…

root → I like when challenge its really about how you can manipulate the instruccion, its easy, think in what do you need to make work this stuff…

as always, thanks to @backslasht for the machine, and thanks to everyone for the hints.

If this result in spoiler, please delete it.