diff --git a/Shepherd.pdf b/Shepherd.pdf index 47eff9891532eb6d2468ce0d43524ab14f248472..4033244c9ef33a2566fdc82924bca86634ba8198 100644 Binary files a/Shepherd.pdf and b/Shepherd.pdf differ diff --git a/Shepherd.tex b/Shepherd.tex index aed0a72904158ff55f53139df40fe0bef26b3e23..95f9661a5fe41b852bc8218a8018c7eb3f0fa1d0 100644 --- a/Shepherd.tex +++ b/Shepherd.tex @@ -294,6 +294,7 @@ them. However, you are free to do the challenges in any order you want. \item[Session Management Challenge 3] \item[SQL Injection 1] \item[SQL Injection 2] + The server first checks if the query contains \emph{one} @ before processing it! \item[Insecure Cryptographic Storage Challenge 1] \item[Insecure Cryptographic Storage Challenge 2] Here, \enquote{2d cipher} refers to the