Boot2User
At this stage, we will scan the network and find the ip address of the machine.

arp-scan -l
As we see this is 192.168.2.102. Next we will see open ports.

nmap 192.168.2.102
Open ssh and apache, so let's check the web page.

Now let's find something interesting.
nikto -h 192.168.2.102 -p 80

In directory /img/ nikto found an interesting file called flaghost.png. After scanning the image through exiftool, I get a new directory names, in which I find the file "flag2.txt"
192.168.2.102/passw@45/


After decrypting a mysterious file that is encrypted with the Brainfuck cipher, I received data for ssh authorization.
web:Hacker@4514

In home directory I found a flag.

Boot2R00t
Using following command i see that I can run awk using root privileges.

sudo -l
Now i get root using awk.

sudo /usr/bin/awk 'BEGIN {system("/bin/sh")}'
The all. Thanks Rahul Gehlaut for CTF.