The provided nmap scan shows that three ports are open: FTP (21), SSH (22), and HTTP (80).
The machine’s website indicates it acts as a security monitoring dashboard and provides downloadable PCAP files.
One such file, found by running Feroxbuster, contains FTP credentials, specifically user ‘nathan’ with password ‘Buck3tH4TF0RM3!‘.
These credentials allow login to an FTP directory hosting an SSH key which when imported and used via ssh ‘root@cap.htb’ allows user to gain root permissions and thus complete machine.