in both of the cases (Dual EC and Streebog/Kuznyechik s-box) what is the information that allows the expotaition?
In the case if Dual EC, it is essentially a private key. Dual EC has two internal elliptic curve points (P and Q); if someone knows the relation between the two (that is, know the integer $n$ that satisifies ($nP = Q$), then they can predict future outputs from the current one. If they don't (and can't otherwise solve the Computational Diffie Hellman problem), then they can't.
This relation is known as the discrete log; it is essentially the private key in most elliptic-curve based cryptosystems.
As for Streebog and Kuznyechik, that's not nearly as clear. We don't know that there is a backdoor (it is widely suspected, because of unexplained regularities within the sbox - one possible reason for those regularities would be so a backdoor would work - however, that's not the only possible reason).
As we don't know how the backdoor (if any) was inserted, it's not as clear how the backdoor would be used. One possibilities is the insertion of a linear characteristic (or something similar); if this guess is correct, then the exploit would involve knowing some amount of plaintext and ciphertext, and then using that characteristic to be able to test parts of the key.