This exercise covers how to use a length extension attack to exploit a directory traversal vulnerability