Watch this video on YouTube
How would an attacker identify weak file permissions that could be exploited in an Ubuntu system?