diff --git a/ webgoat/main/project/WebContent/lesson_plans/WeakSessionID.html b/ webgoat/main/project/WebContent/lesson_plans/WeakSessionID.html index 2ea769f51..45157e0b5 100644 --- a/ webgoat/main/project/WebContent/lesson_plans/WeakSessionID.html +++ b/ webgoat/main/project/WebContent/lesson_plans/WeakSessionID.html @@ -3,7 +3,7 @@

Concept / Topic To Teach:

-Application developers who develop their own session ID frequently forget to incorporate the complexity and randomness necessary for security. If the user specific session id is not complex and random, then the application is highly susceptible to session-based brute force attacks. +Application developers who develop their own session IDs frequently forget to incorporate the complexity and randomness necessary for security. If the user specific session ID is not complex and random, then the application is highly susceptible to session-based brute force attacks.

General Goal(s):

Try to access an authenticated session belonging to someone else. \ No newline at end of file