From d4a0ddec47ebd135c0d4798ce81abb6e8ed5bb7b Mon Sep 17 00:00:00 2001 From: "Z. Cliffe Schreuders" Date: Fri, 26 Sep 2025 23:07:13 +0100 Subject: [PATCH] Update image paths across multiple lab files to use site.baseurl for improved compatibility and accessibility --- _labs/introducing_attacks/1_intro_linux.md | 6 +++--- .../2_malware_msf_payloads.md | 6 +++--- _labs/introducing_attacks/3_vulnerabilities.md | 14 +++++++------- _labs/introducing_attacks/5_scanning.md | 6 +++--- _labs/introducing_attacks/6_exploitation.md | 10 +++++----- .../8_vulnerability_analysis.md | 18 +++++++++--------- 6 files changed, 30 insertions(+), 30 deletions(-) diff --git a/_labs/introducing_attacks/1_intro_linux.md b/_labs/introducing_attacks/1_intro_linux.md index a261b17..be8326c 100644 --- a/_labs/introducing_attacks/1_intro_linux.md +++ b/_labs/introducing_attacks/1_intro_linux.md @@ -570,6 +570,6 @@ Well done\! Not bad for the first week\! [^7]: Public-key crypto will be covered at a later stage in your studies, but if you are curious now here is an overview: [http://en.wikipedia.org/wiki/Public\_key](http://en.wikipedia.org/wiki/Public_key) -[vm_launch_icon]: /assets/images/common/vm_launch_icon.png -[virtualisation]: /assets/images/introducing_attacks/1_intro_linux/virtualisation.png -[terminal_icon]: /assets/images/introducing_attacks/1_intro_linux/terminal_icon.png +[vm_launch_icon]: {{ site.baseurl }}/assets/images/common/vm_launch_icon.png +[virtualisation]: {{ site.baseurl }}/assets/images/introducing_attacks/1_intro_linux/virtualisation.png +[terminal_icon]: {{ site.baseurl }}/assets/images/introducing_attacks/1_intro_linux/terminal_icon.png diff --git a/_labs/introducing_attacks/2_malware_msf_payloads.md b/_labs/introducing_attacks/2_malware_msf_payloads.md index 1f1ae56..153a8b0 100644 --- a/_labs/introducing_attacks/2_malware_msf_payloads.md +++ b/_labs/introducing_attacks/2_malware_msf_payloads.md @@ -440,6 +440,6 @@ At this point you have: Well done\! -[vm_launch_icon]: /assets/images/common/vm_launch_icon.png -[chrome_downloads_mygame]: /assets/images/introducing_attacks/2_malware_msf_payloads/chrome_downloads_mygame.png -[windows_proxy_settings]: /assets/images/introducing_attacks/2_malware_msf_payloads/windows_proxy_settings.png +[vm_launch_icon]: {{ site.baseurl }}/assets/images/common/vm_launch_icon.png +[chrome_downloads_mygame]: {{ site.baseurl }}/assets/images/introducing_attacks/2_malware_msf_payloads/chrome_downloads_mygame.png +[windows_proxy_settings]: {{ site.baseurl }}/assets/images/introducing_attacks/2_malware_msf_payloads/windows_proxy_settings.png diff --git a/_labs/introducing_attacks/3_vulnerabilities.md b/_labs/introducing_attacks/3_vulnerabilities.md index 9599439..760f92f 100644 --- a/_labs/introducing_attacks/3_vulnerabilities.md +++ b/_labs/introducing_attacks/3_vulnerabilities.md @@ -643,11 +643,11 @@ Well done\! [^2]: Remember we are exploiting a vulnerability of the Adobe Reader application, so use Adobe Reader and not Chrome to open the PDF file. -[bind_shell]: /assets/images/introducing_attacks/3_vulnerabilities/bind_shell.png -[vm_launch_icon]: /assets/images/common/vm_launch_icon.png -[firewall_dialogue]: /assets/images/introducing_attacks/3_vulnerabilities/firewall_dialogue.png -[linux_victim_server_vm]: /assets/images/introducing_attacks/3_vulnerabilities/linux_victim_server_vm.png -[bind_shell_blocked]: /assets/images/introducing_attacks/3_vulnerabilities/bind_shell_blocked.png -[reverse_shell]: /assets/images/introducing_attacks/3_vulnerabilities/reverse_shell.png -[msf_interfaces]: /assets/images/introducing_attacks/3_vulnerabilities/msf_interfaces.png +[bind_shell]: {{ site.baseurl }}/assets/images/introducing_attacks/3_vulnerabilities/bind_shell.png +[vm_launch_icon]: {{ site.baseurl }}/assets/images/common/vm_launch_icon.png +[firewall_dialogue]: {{ site.baseurl }}/assets/images/introducing_attacks/3_vulnerabilities/firewall_dialogue.png +[linux_victim_server_vm]: {{ site.baseurl }}/assets/images/introducing_attacks/3_vulnerabilities/linux_victim_server_vm.png +[bind_shell_blocked]: {{ site.baseurl }}/assets/images/introducing_attacks/3_vulnerabilities/bind_shell_blocked.png +[reverse_shell]: {{ site.baseurl }}/assets/images/introducing_attacks/3_vulnerabilities/reverse_shell.png +[msf_interfaces]: {{ site.baseurl }}/assets/images/introducing_attacks/3_vulnerabilities/msf_interfaces.png diff --git a/_labs/introducing_attacks/5_scanning.md b/_labs/introducing_attacks/5_scanning.md index 9ef2967..9a563c7 100644 --- a/_labs/introducing_attacks/5_scanning.md +++ b/_labs/introducing_attacks/5_scanning.md @@ -686,6 +686,6 @@ There are flags to be found in the banner grabbing tasks, and an opportunity to [^3]: For a technical description of how Nmap’s OS detection works: [http://nmap.org/book/osdetect-methods.html](http://nmap.org/book/osdetect-methods.html) -[vm_launch_icon]: /assets/images/common/vm_launch_icon.png -[tcp_handshake]: /assets/images/introducing_attacks/5_scanning/tcp_handshake.png -[zenmap]: /assets/images/introducing_attacks/5_scanning/zenmap.png \ No newline at end of file +[vm_launch_icon]: {{ site.baseurl }}/assets/images/common/vm_launch_icon.png +[tcp_handshake]: {{ site.baseurl }}/assets/images/introducing_attacks/5_scanning/tcp_handshake.png +[zenmap]: {{ site.baseurl }}/assets/images/introducing_attacks/5_scanning/zenmap.png \ No newline at end of file diff --git a/_labs/introducing_attacks/6_exploitation.md b/_labs/introducing_attacks/6_exploitation.md index 7c3c5ee..1ecd588 100644 --- a/_labs/introducing_attacks/6_exploitation.md +++ b/_labs/introducing_attacks/6_exploitation.md @@ -574,8 +574,8 @@ Congratulations\! [^4]: If you have already found the Windows flag, you can skip the step-by-step instructions to hack into the Windows machine. Instead, you should use Armitage to break into the Linux machine and find the flag. -[vm_launch_icon]: /assets/images/common/vm_launch_icon.png -[armitage_set_local_ip_address]: /assets/images/introducing_attacks/6_exploitation/armitage_set_local_ip_address.png -[metasploit_launch_slide]: /assets/images/introducing_attacks/6_exploitation/metasploit_launch_slide.png -[armitage_compromised]: /assets/images/introducing_attacks/6_exploitation/armitage_compromised.png -[armitage_attack_menu_easyftp]: /assets/images/introducing_attacks/6_exploitation/armitage_attack_menu_easyftp.png +[vm_launch_icon]: {{ site.baseurl }}/assets/images/common/vm_launch_icon.png +[armitage_set_local_ip_address]: {{ site.baseurl }}/assets/images/introducing_attacks/6_exploitation/armitage_set_local_ip_address.png +[metasploit_launch_slide]: {{ site.baseurl }}/assets/images/introducing_attacks/6_exploitation/metasploit_launch_slide.png +[armitage_compromised]: {{ site.baseurl }}/assets/images/introducing_attacks/6_exploitation/armitage_compromised.png +[armitage_attack_menu_easyftp]: {{ site.baseurl }}/assets/images/introducing_attacks/6_exploitation/armitage_attack_menu_easyftp.png diff --git a/_labs/introducing_attacks/8_vulnerability_analysis.md b/_labs/introducing_attacks/8_vulnerability_analysis.md index 7fd8658..9c0aa34 100644 --- a/_labs/introducing_attacks/8_vulnerability_analysis.md +++ b/_labs/introducing_attacks/8_vulnerability_analysis.md @@ -257,12 +257,12 @@ At this point you have: Well done! -[vm_launch_icon]: /assets/images/common/vm_launch_icon.png -[nessus_my_scans_empty_folder_interface]: /assets/images/introducing_attacks/8_vulnerability_analysis/nessus_my_scans_empty_folder_interface.png -[nessus_scan_templates_selection_interface]: /assets/images/introducing_attacks/8_vulnerability_analysis/nessus_scan_templates_selection_interface.png -[nessus_new_scan_configuration_target_setup]: /assets/images/introducing_attacks/8_vulnerability_analysis/nessus_new_scan_configuration_target_setup.png -[nessus_vulnerability_results_basic_scan_comparison]: /assets/images/introducing_attacks/8_vulnerability_analysis/nessus_vulnerability_results_basic_scan_comparison.png -[nessus_advanced_scan_configuration_accuracy_settings]: /assets/images/introducing_attacks/8_vulnerability_analysis/nessus_advanced_scan_configuration_accuracy_settings.png -[nessus_vulnerability_results_advanced_scan_with_severity_breakdown]: /assets/images/introducing_attacks/8_vulnerability_analysis/nessus_vulnerability_results_advanced_scan_with_severity_breakdown.png -[nikto_web_vulnerability_scan_output_target_host]: /assets/images/introducing_attacks/8_vulnerability_analysis/nikto_web_vulnerability_scan_output_target_host.png -[metasploit_sudo_baron_samedit_exploit_command]: /assets/images/introducing_attacks/8_vulnerability_analysis/metasploit_sudo_baron_samedit_exploit_command.png +[vm_launch_icon]: {{ site.baseurl }}/assets/images/common/vm_launch_icon.png +[nessus_my_scans_empty_folder_interface]: {{ site.baseurl }}/assets/images/introducing_attacks/8_vulnerability_analysis/nessus_my_scans_empty_folder_interface.png +[nessus_scan_templates_selection_interface]: {{ site.baseurl }}/assets/images/introducing_attacks/8_vulnerability_analysis/nessus_scan_templates_selection_interface.png +[nessus_new_scan_configuration_target_setup]: {{ site.baseurl }}/assets/images/introducing_attacks/8_vulnerability_analysis/nessus_new_scan_configuration_target_setup.png +[nessus_vulnerability_results_basic_scan_comparison]: {{ site.baseurl }}/assets/images/introducing_attacks/8_vulnerability_analysis/nessus_vulnerability_results_basic_scan_comparison.png +[nessus_advanced_scan_configuration_accuracy_settings]: {{ site.baseurl }}/assets/images/introducing_attacks/8_vulnerability_analysis/nessus_advanced_scan_configuration_accuracy_settings.png +[nessus_vulnerability_results_advanced_scan_with_severity_breakdown]: {{ site.baseurl }}/assets/images/introducing_attacks/8_vulnerability_analysis/nessus_vulnerability_results_advanced_scan_with_severity_breakdown.png +[nikto_web_vulnerability_scan_output_target_host]: {{ site.baseurl }}/assets/images/introducing_attacks/8_vulnerability_analysis/nikto_web_vulnerability_scan_output_target_host.png +[metasploit_sudo_baron_samedit_exploit_command]: {{ site.baseurl }}/assets/images/introducing_attacks/8_vulnerability_analysis/metasploit_sudo_baron_samedit_exploit_command.png