“Defend the Web” write-up (24 bit —file extension manipulation exploit )

David Artykov
Purple Team
Published in
2 min readAug 24, 2021

--

In this particular example, we are required to extract the login details from the file that is available for us to download.

Let’s start the challenge by downloading the file and try to analyze it.

Double-click on the file and see what's inside.

--

--