You can start a download here at http://10.10.10.245/download/02. The files 2, 02, 002 etc are the same. Fuzzing for the number, you find some more between 0 and 9 that have a certain size, indicating interesting contents.
I downloaded them with wget and will inspect them with wireshark.
7: looks like a bruteforce on php files, but not interesting
9: looks like a bruteforce, but also not interesting
You could ssh onto the server with nathans credentials
Script w/ SetSUID Cap
In /var/www/html there was a file called app.py, which was owned by nathan. It contained os.setuid(0) among some other stuff, which revealed, that you could start a root shell. I did so in Python:
The file /usr/bin/python3.8 is owned by root, but it is not an SUID binary. However, if you scan the device with LinPEASS, you find out, that the cap_setuid option is enabled in the Python config.
This also explains the name of the box “cap”, as the privesc uses Linux capabilities, which is a way to allow certain caps as root. capsh is a ultitity related to it.