Which file does the attacker need to modify?