Target from: Escape Rooms Network

10: Flags (6:other, 2:system, env, root
)
1: Service
8,400 pts
Avg. headshot: 58,231 minutes
0: Flags found
1: Service discovered
100 pts
Can you abuse the package manager of each step to get a shell? The flag from each level can be used as a password to login directly to that user.
Activity Stream
Latest activity on the platform