This exercise covers how you can create a malicious Zip file and use it to gain access to sensitive files.