This exercise covers the exploitation of an application using CBC-MAC when an attacker has control over the IV
The ISO for this exercise is only available with a "PentesterLab PRO" subscription.
You can access the course for this exercise by clicking here
More details on how to access the online version of this exercise can be found here
More details on how to access the videos for this exercise can be found here