This is about the time you attempt a password crack, via brute force or a dictionary based attack, or otherwise
Generally, the interior is much more vulnerable than the exterior perimeter
Adequately escalating your privileges allows you to have control over the full functionality of a device. Meaning you can install whatever you like, run whichever commands you like, edit what you like, extract all the data you like (supposedly), all that good wholesome shoite.