Magic

Finally Rooted.
What a box. Like many people, I overwhelm on the user and the root part.

For the foothold, you need to get to the basics. Owasp’s Top 10 and all those things.

For the user, you need to enum, to find creds, to find a tool to use, to find the creds you need. Don’t overthink. If a tool doesn’t isn’t here, maybe a cousin of his is there.

For the root, enum again. Find a vulnerable program with the right tools. How does it work ? Does it call other programs ? Are they usable ?