Overview
The machine starts by finding a virtual host running on 443 that hosts an MCP service that is vulnerable to RCE attack which let us get initial foothold to the system as low privileged user From here through the Privilege escalation I don't know if my way was the intended way to solve this machine so I guess we'll have to wait for the official writeup
Reading the official writeup is important because it gives you new insights that you might not have thought of
Enumeration
we are gonna start our enumeration process with nmap
...
