I thought this target would be easy. I enumerated services and saw that the host had S*** enabled. I downloaded the user name list from the course’s Resources page and ran a tool to verify which of the users existed. None matched. I expanded the search by using a few user lists included with the pwnbox under /usr/share/SecLists, but still got no hits.
I could try brute forcing username / password combos against the other services hosted on this box, but I think I would be missing something obvious.
Any tips on finding the initial username to get a foothold on this box?