# Abusing Intended Functionality If a program doesn't have an escape sequence, it may still be possible to use it to escalate privileges. If we can read files owned by root, we may be able to extract useful information (e.g. password, hashes, keys). If we can write to files owned by root, we may be able to insert or modify information.