Kenobi involves accessing an open Samba share and abusing a vulnerable version of ProFtpd to get a foothold on the machine, and then abusing a SUID binary to elevate privileges to root.
This subscription room involves abusing a logic flaw to get access to an admin panel, leveraging an internal API to obtain credentials, and then achieving RCE on a web server.