diff --git a/modules/generators/structured_content/hackerbot_config/hacker_vs_hackerbot_2/templates/lab.xml.erb b/modules/generators/structured_content/hackerbot_config/hacker_vs_hackerbot_2/templates/lab.xml.erb
index a2e67dc30..458a47282 100644
--- a/modules/generators/structured_content/hackerbot_config/hacker_vs_hackerbot_2/templates/lab.xml.erb
+++ b/modules/generators/structured_content/hackerbot_config/hacker_vs_hackerbot_2/templates/lab.xml.erb
@@ -130,11 +130,12 @@ Randomised instance generated by [SecGen](http://github.com/cliffe/SecGen) (<%=
%>
<%= ERB.new(File.read self.templates_path + $permission_attacks.pop ).result(self.get_binding) %>
-
+
<%
$integrity_attacks = ['integrity_attack1.xml.erb', 'integrity_attack2.xml.erb', 'integrity_attack3.xml.erb', 'integrity_attack4.xml.erb', 'integrity_attack5.xml.erb', 'integrity_attack6.xml.erb', 'integrity_attack7.xml.erb'].shuffle
%>
<%= ERB.new(File.read self.templates_path + $integrity_attacks.pop ).result(self.get_binding) %>
+<%= ERB.new(File.read self.templates_path + $integrity_attacks.pop ).result(self.get_binding) %>
<%
diff --git a/modules/generators/structured_content/hackerbot_config/hacker_vs_hackerbot_2/templates/snort_rule_3.xml.erb b/modules/generators/structured_content/hackerbot_config/hacker_vs_hackerbot_2/templates/snort_rule_3.xml.erb
index 3962212f0..56251b531 100644
--- a/modules/generators/structured_content/hackerbot_config/hacker_vs_hackerbot_2/templates/snort_rule_3.xml.erb
+++ b/modules/generators/structured_content/hackerbot_config/hacker_vs_hackerbot_2/templates/snort_rule_3.xml.erb
@@ -8,7 +8,7 @@
false
- Create a Snort rule that detects any unencrypted POP3 email *user authentication attempt* (someone trying to log in), to a mail server on <%= $web_server_ip %>. The alert must include the message "<%= $rand_alert4 %>". Up to three flags will be awarded, based on the quality of the rule.
+ Create a Snort rule that detects any unencrypted POP3 email *user authentication attempt* (someone trying to log in), to a mail server on <%= $web_server_ip %>. The alert must include the message "<%= $rand_alert4 %>". One flags will be awarded, based on the quality of the rule.
^--1