Here, we found a CVE that we could exploit. We downloaded the corresponding program and ran it, which allowed us to discover the password. To run the program, we used the '-u' flag to specify the URL (e.g.
https://IP/simple), and the '-w' flag to provide a wordlist for the program to use.