On the /file webpage, we find the same files that we found on the FTP server.
Exploitation
Since we can write files on the FTP server and access them on the web server, we could upload PHP reverse shell code to the FTP server and run it on the website.
We can open a netcat listener and execute the file on the webserver.
We then established a stable shell. We found a suspicious PCAP file on the machine, downloaded it locally, and accessed its content.
We retrieved a password from the Wireshark file lennie:c4ntg3t3n0ughsp1c3
This worked for the user lennie, and we obtained the user flag this way.
Privilege Escalation
lennie has a script that simply echoes "Done!".
We can check if the script is being run on the system using pspy.
A CRON job is running the script.
Since we have write access to /etc/print.sh, we can insert a reverse shell script inside. We gained a root shell when the CRON job executed it.