This exercise covers the exploitation of an application using CBC-MAC when an attacker has control over the IV