goat


Checking for sudo privileges of the goat user after making the lateral movement

goat@funbox7:~$ sudo -l
Matching Defaults entries for goat on funbox7:
    env_reset, mail_badpass, secure_path=/usr/local/sbin\:/usr/local/bin\:/usr/sbin\:/usr/bin\:/sbin\:/bin\:/snap/bin
 
User goat may run the following commands on funbox7:
    (root) NOPASSWD: /usr/bin/mysql

The goat user is able to execute the /usr/bin/mysql command as the root account without getting prompted for password

According to GTFObins, mysql can be leveraged for privilege escalation