Privilege Escalation Techniques - Kernel Exploits & SUDO Permissions