Length Extension Attack

- https://en.wikipedia.org/wiki/Length_extension_attack
- https://github.com/iagox86/hash_extender

Exploitation

We can exploit the vulnerability with hash_extender.