— Sloth Boss
Gaining root access on a Linux system might seem like magic, but it's often a methodical process of investigation and exploiting simple misconfigurations. You don't always need a complex, unknown "zero-day" exploit; sometimes, the keys to the kingdom are left lying in plain sight. An attacker who has gained a low-privilege shell will immediately start enumerating the system, looking for these mistakes: weak file permissions, programs they can run with sudo, or binaries with the SUID bit set.