Wall

You can easily spot the vulnerability using one of the well-known privilege escalation checks. It will be useful if you know which files have some special “attribute” in a typical Linux environment.