Challenge 1
Ahmed has created a web application for his special audience. These special users of his websites are given a secret key provided by Ahmed thorugh which they can log in and can excess the exclusive content.
Below is the input field in which users can enter their secret key and log in. However Ahmed has left a serious vulnerability while coding his website. You being not an authorized user have to somehow exploit this vulnerability to access his website!