privesc_challenges Different methods covered Readable shadow file and weak root password -> machine03 SUID capabilities -> machine05 SUDO capabilities -> machine01 Cron jobs -> machine02 Relative module path injection in an interpreted language (python) -> machine04