Search for question
Question

d. Login as a non-root user. Verify that the exploit still works on the vulnerable program. (It may not!)

Fig: 1