..had to run as root, otherwise they would not function properly.
Once upon a time, a government auditor insisted to me that keystroke loggers had to run as root, otherwise they would not function properly. So, I wrote a keystroke logger that ran as a normal user and showed it to him.
He wasn’t amused. He said that I was violating government IT policy by demonstrating the program to him.
Some time later, another auditor was adamant that I would not be able to copy files from his _secure enclave_ computers onto the Internet. He said that he had strong network security measures in place. So, I wrote another small program to copy files from his enclave computers onto the Internet.
He wasn’t amused either, but was far more appreciative when I showed him how it worked.
Link 1
Exfiltrate files using the DNS | Go350:
https://www.go350.com/posts/exfiltrate-files-using-the-dns