This machine provide a remote Python REPL environment via a SimpleHTTP service.
We just gain initial access by constructing a simple Python version of a reverse shell.
After conducting a thorough search of the system (targeting users with login shells), we discovered that one user maintained a Git repository containing their login credentials. Subsquently, uncovered clues within the Git logs pointing to the remote REPL environment. This led us to further fuzz the environment hidden endpoint and its password, ultimately gaining root privilege.