After gaining initial low-privilege access to a Linux system, a penetration tester identifies an interesting binary in a user's home folder titled ’’changepass.”-sr-xr-x 1 root root 6443 Oct 18 2017 /home/user/changepassUsing “strings" to print ASCII printable characters from changepass, the tester notes the following:$ strings changepassexitsetuidstrcmpGLIBC_2.0ENV_PATH%s/changepwmallocstrlenGiven this information, which of the following is the MOST likely path of exploitation to achieve root privileges on
A. opy changepass to a writable directory and export the ENV_PATH environmental variable to the path of a token-stealing binary titled changepw
B. reate a copy of changepass in the same directory, naming it changepw
C. xport the ENV_PATH environmental variable to the path of a writable directory that contains a token- stealing binary titled changepw
D. un changepass within the current directory with sudo after exporting the ENV_PATH environmental variable to the path of '/usr/local/bin'