Compromise a Virtual Machine
You are to infiltrate the provided system and attain root privileges.
The System contains 5 flags represented as values which are hidden in home directories, webpages etc.
Example flag: chahNaelia9zohlaseiPaich0QuoWoh8ohfaenaiQuaetaebushoakarai6lainohjongoneesoocahdei6guosiethae7uwuu5Kaid9eisah8EChoo4kaiGh2eit2mu
Write a simple report outline each test and attack created against the machine and the result.
The report should be clear enough for someone with average hacking knowledge to follow easily.
List location of all flags and credentials that were encountered as part of your hacking endeavours.
The system must be compromised over the network. Local, physical attackers are not permitted.
The VM is 810MB and we will need to find a reliable method of transfer.