This medium-difficulty Linux CTF involved:
β’ Directory bruteforcing to uncover hidden paths
β’ Remote File Inclusion (RFI) to access sensitive data
β’ Steganography and password cracking to extract credentials
β’ Python jail escape leading to privilege escalation
β’ Full root access gained via SSH
The write-up demonstrates the full exploitation flow β from initial web entry point to root access.