@ValleyCommando said:
Enjoyed this box :-). Learnt that you have to be very thorough ;).TIps:
1.) Don’t over complicate things and go running various exploits. This is a simple box.
2.) When you are on the system, make sure you are thorough. A privilege escalation checklist can help you with this.
Can you recommend such a checklist?