SetUID is a file permission that allows a binary to be run as the owner of the file.
Specifically, if a binary is SetUID root, we can likely exploit the functionality of that binary to gain root access to the system it’s on.
To find all SetUID binaries on a given system, run
find / -perm -4000 2>/dev/null
Check out https://gtfobins.github.io/