Linux Privilege Escalation 6 - Exploiting Weak File Permissions