Which action is an attacker taking when they attempt to gain root access on the victims system?