diff --git a/main/project/WebContent/lesson_solutions/MultiLevelLogin1/MultiLevelLogin1.html b/main/project/WebContent/lesson_solutions/MultiLevelLogin1.html similarity index 63% rename from main/project/WebContent/lesson_solutions/MultiLevelLogin1/MultiLevelLogin1.html rename to main/project/WebContent/lesson_solutions/MultiLevelLogin1.html index 9a5056086..adc96712f 100644 --- a/main/project/WebContent/lesson_solutions/MultiLevelLogin1/MultiLevelLogin1.html +++ b/main/project/WebContent/lesson_solutions/MultiLevelLogin1.html @@ -32,18 +32,39 @@ works. In the second you have to breake the strong authentication.
Stage 1
This stage should be rather straight forward. Give in as name Jane
-and as password tarzan. Afther clicking on the submit button
-you will be asked for the TAN. Choose the correct TAN from the
+and as password tarzan.
Stage 2
The first step in this stage is equal to Stage 1. Log in as Jane with tarzan.
-Now you will be asked for a TAN. Unfortunately the TAN you have only a already
+Now you will be asked for a TAN. Unfortunately you have only a already
used TAN from the victim. Fill in the TAN you have and make sure that WebScarab
will intercept the next request. Hit the submit button and change the hidden_tan
-value to 1. Congratulations you are logged in as Jane.
-