Skip to content

Commit c29aa5f

Browse files
committed
Minor text changes
1 parent 3d9963d commit c29aa5f

File tree

4 files changed

+4
-4
lines changed

4 files changed

+4
-4
lines changed

insecureinc/src/main/webapp/cwe502.jsp

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -43,7 +43,7 @@ if(usr!=null && pwd!=null){
4343
</nav>
4444
<div class="container">
4545
<h3>Welcome!</h3>
46-
<p> Try to brute force the admin password (which is one of the top 5 insecure passwords - see the brute force challenge), login and see if you can take over the server now.</p>
46+
<p> Try to brute force the admin password (which is one of the top 5 insecure passwords - see the Green Belt Password Guessing challenge), login and see if you can take over the server now.</p>
4747
<form action="cwe502.jsp" autocomplete="off" method="POST">
4848
<div class="form-group">
4949
<label for="usr">Name:</label>

insecureinc/src/main/webapp/cwe78.jsp

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -42,7 +42,7 @@ if(usr!=null && pwd!=null){
4242
</nav>
4343
<div class="container">
4444
<h3>Welcome!</h3>
45-
<p> You should have the admin credentials from the brute force challenge, login and see if you can take over the server now.</p>
45+
<p> You should have the admin credentials from the Green Belt Password Guessing challenge, login and see if you can take over the server now.</p>
4646
<form action="cwe78.jsp" autocomplete="off" method="POST">
4747
<div class="form-group">
4848
<label for="usr">Name:</label>

insecureinc/src/main/webapp/quiz.jsp

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -241,7 +241,7 @@ Which is the best way to ensure the integrity of software updates?
241241
<blockquote>
242242
Which of the snippets below has a security issue?
243243
</blockquote>
244-
<%=getOption(answers,"q11","1","<pre>response.sendRedirect(\"http://google.com\");</pre>")%>
244+
<%=getOption(answers,"q11","1","<pre>response.sendRedirect(\"https://google.com\");</pre>")%>
245245
<%=getOption(answers,"q11","2","<pre>response.sendRedirect(request.getParameter(\"redirect\"));</pre>")%>
246246
<%=getOption(answers,"q11","3","<pre>response.sendRedirect(UrlResourceManager.get(request.getParameter(\"pageId\")));</pre>")%>
247247
<hr>

trainingportal/static/lessons/blackBelt/cwe502.html

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -64,7 +64,7 @@ <h4>Exploiting Deserialization</h4>
6464
<h4>About the Challenge</h4>
6565
<p>
6666
The website allows an administration page to process Java objects.
67-
The password to the administration site is one of the most commonly used (see brute force challenge)
67+
The password to the administration site is one of the most commonly used (see Green Belt Password Guessing challenge)
6868
</p>
6969

7070

0 commit comments

Comments
 (0)