“Defend the Web” write-up (24 bit —file extension manipulation exploit )
Published in
2 min readAug 24, 2021
In this particular example, we are required to extract the login details from the file that is available for us to download.
Let’s start the challenge by downloading the file and try to analyze it.
Double-click on the file and see what's inside.