If we can read files owned by root, we may be able to extract useful information (e.g. passwords, hashes, keys). If we can write to files owned by root, we may be able to insert or modify information.
Last updated 2 years ago