The following are the exploit guides for the scenarios created in this chapter. These are guidelines, and there are more ways to exploit the vulnerabilities.
The brief provided for this exploitation guide is assumed to be:
Use the common web framework vulnerability to capture the RFLAGG's finances spreadsheet from his documents directory.
The following are the steps to be performed for this scenario: