I began with a full Nmap scan against the target 172.20.43.205:
nmap -sC -sV -p- 172.20.43.205
Findings:
This indicated a potential FTP → Web exposure → Shell attack path.
I enumerated the webserver with dirsearch:
dirsearch -u <http://172.20.43.205/>
Discovered an interesting directory exposed at:
<http://172.20.43.205/ftp/>

What is the advertising budget of Orbitronix Systems in dollars? The answer in this file