TomGhost 1. Compromise this machine and obtain user.txt THM{GhostCat_1s_so_cr4sy} 2. Escalate privileges and obtain root.txt THM{Z1P_1S_FAKE} Intern-Yago | Janeiro 18, 2023