pspy processes and privilege escalation [closed]


I’ve been given a task to read the root proccesses on a victim machine by using pspy.

I’ve managed to successfully download the program onto the machine and run it. What Id like to know is if anyone can help me understand the processes Im seeing.

2020/07/19 00:27:59 CMD: UID=0    PID=6725   | /usr/sbin/sshd -D -R  2020/07/19 00:27:59 CMD: UID=106  PID=6726   | sshd: [net]           2020/07/19 00:28:00 CMD: UID=0    PID=6727   | /usr/sbin/sshd -D -R  2020/07/19 00:28:00 CMD: UID=106  PID=6728   | sshd: [net]           2020/07/19 00:28:01 CMD: UID=0    PID=6733   | /bin/sh -c /bin/cp /var/backups/.update-motd.d/* /etc/update-motd.d/  2020/07/19 00:28:01 CMD: UID=0    PID=6732   | sleep 30  2020/07/19 00:28:01 CMD: UID=0    PID=6731   | /bin/sh -c sleep 30 ; /bin/cp /var/backups/.update-motd.d/* /etc/update-motd.d/  2020/07/19 00:28:01 CMD: UID=0    PID=6730   | /usr/sbin/CRON -f  2020/07/19 00:28:01 CMD: UID=0    PID=6729   | /usr/sbin/CRON -f  2020/07/19 00:28:31 CMD: UID=0    PID=6735   | /bin/cp /var/backups/.update-motd.d/00-header /var/backups/.update-motd.d/10-help-text /var/backups/.update-motd.d/50-motd-news /var/backups/.update-motd.d/80-esm /var/backups/.update-motd