well let's assume there is an admin(root) running that software, and you are just a normal user
you should find the vulnerability and write a POC for it
I said vulnerability not Pwning the binary to gain root
root run the vulnerable software\\
other user on the same system with no root privileges exploit the vulnerability to gain some advantage \\
I hope that makes it clear
you should find the vulnerability and write a POC for it
I said vulnerability not Pwning the binary to gain root
root run the vulnerable software\\
other user on the same system with no root privileges exploit the vulnerability to gain some advantage \\
I hope that makes it clear