Traverxec

Type your comment> @Xelinion said:

It took me quite enough, but it was a fun machine

As almost everyone said before: enumeration is fundamental to understand the machine itself. Some common vulnerabilities to get the first step, then john and man are the keys (if something is not visible doesn’t means it does not exists)

For root: some really fun pe; remember that size do matter here

If you need any hint feel free to pm me

Hey there, I found the /~d**** directory after reading the manual, and the .h**d file and had decrypted it. I did also read about creating an .htacc file to allow basic auth, but kind of stuck here now to get to user. Any hints?