diff --git a/webgoat-lessons/webwolf-introduction/src/main/resources/lessonPlans/en/Landing_page.adoc b/webgoat-lessons/webwolf-introduction/src/main/resources/lessonPlans/en/Landing_page.adoc index c08b167bf..9a4099391 100644 --- a/webgoat-lessons/webwolf-introduction/src/main/resources/lessonPlans/en/Landing_page.adoc +++ b/webgoat-lessons/webwolf-introduction/src/main/resources/lessonPlans/en/Landing_page.adoc @@ -16,10 +16,10 @@ image::images/requests.png[caption="Figure: ", style="lesson-image"] {nbsp} Suppose we tricked a user to click on a link he/she received in an email, this link will open up our crafted -password reset link page. The user does not see any difference with the normal password reset page of the company. -The user enters a new password and hits enter, the new password will be send to your host. In this case the new -password will be send to WebWolf. Try to locate the unique code. +password reset link page. The user does not notice any differences compared to the normal password reset page of the company. +The user enters a new password and hits enter. The new password will be sent to your host. In this case the new +password will be sent to WebWolf. Try to locate the unique code. -Please be aware after resetting the password the user will receive an error page in a real attack scenario the +Please be aware that after resetting the password the user will receive an error page. In a real attack scenario the user would probably see a normal success page (this is due to a limit what we can control with WebWolf)