Update image paths across multiple lab files to use site.baseurl for improved compatibility and accessibility

This commit is contained in:
Z. Cliffe Schreuders
2025-09-26 23:07:13 +01:00
parent 386dfe8b75
commit d4a0ddec47
6 changed files with 30 additions and 30 deletions

View File

@@ -570,6 +570,6 @@ Well done\! Not bad for the first week\!
[^7]: Public-key crypto will be covered at a later stage in your studies, but if you are curious now here is an overview: [http://en.wikipedia.org/wiki/Public\_key](http://en.wikipedia.org/wiki/Public_key)
[vm_launch_icon]: /assets/images/common/vm_launch_icon.png
[virtualisation]: /assets/images/introducing_attacks/1_intro_linux/virtualisation.png
[terminal_icon]: /assets/images/introducing_attacks/1_intro_linux/terminal_icon.png
[vm_launch_icon]: {{ site.baseurl }}/assets/images/common/vm_launch_icon.png
[virtualisation]: {{ site.baseurl }}/assets/images/introducing_attacks/1_intro_linux/virtualisation.png
[terminal_icon]: {{ site.baseurl }}/assets/images/introducing_attacks/1_intro_linux/terminal_icon.png

View File

@@ -440,6 +440,6 @@ At this point you have:
Well done\!
[vm_launch_icon]: /assets/images/common/vm_launch_icon.png
[chrome_downloads_mygame]: /assets/images/introducing_attacks/2_malware_msf_payloads/chrome_downloads_mygame.png
[windows_proxy_settings]: /assets/images/introducing_attacks/2_malware_msf_payloads/windows_proxy_settings.png
[vm_launch_icon]: {{ site.baseurl }}/assets/images/common/vm_launch_icon.png
[chrome_downloads_mygame]: {{ site.baseurl }}/assets/images/introducing_attacks/2_malware_msf_payloads/chrome_downloads_mygame.png
[windows_proxy_settings]: {{ site.baseurl }}/assets/images/introducing_attacks/2_malware_msf_payloads/windows_proxy_settings.png

View File

@@ -643,11 +643,11 @@ Well done\!
[^2]: Remember we are exploiting a vulnerability of the Adobe Reader application, so use Adobe Reader and not Chrome to open the PDF file.
[bind_shell]: /assets/images/introducing_attacks/3_vulnerabilities/bind_shell.png
[vm_launch_icon]: /assets/images/common/vm_launch_icon.png
[firewall_dialogue]: /assets/images/introducing_attacks/3_vulnerabilities/firewall_dialogue.png
[linux_victim_server_vm]: /assets/images/introducing_attacks/3_vulnerabilities/linux_victim_server_vm.png
[bind_shell_blocked]: /assets/images/introducing_attacks/3_vulnerabilities/bind_shell_blocked.png
[reverse_shell]: /assets/images/introducing_attacks/3_vulnerabilities/reverse_shell.png
[msf_interfaces]: /assets/images/introducing_attacks/3_vulnerabilities/msf_interfaces.png
[bind_shell]: {{ site.baseurl }}/assets/images/introducing_attacks/3_vulnerabilities/bind_shell.png
[vm_launch_icon]: {{ site.baseurl }}/assets/images/common/vm_launch_icon.png
[firewall_dialogue]: {{ site.baseurl }}/assets/images/introducing_attacks/3_vulnerabilities/firewall_dialogue.png
[linux_victim_server_vm]: {{ site.baseurl }}/assets/images/introducing_attacks/3_vulnerabilities/linux_victim_server_vm.png
[bind_shell_blocked]: {{ site.baseurl }}/assets/images/introducing_attacks/3_vulnerabilities/bind_shell_blocked.png
[reverse_shell]: {{ site.baseurl }}/assets/images/introducing_attacks/3_vulnerabilities/reverse_shell.png
[msf_interfaces]: {{ site.baseurl }}/assets/images/introducing_attacks/3_vulnerabilities/msf_interfaces.png

View File

@@ -686,6 +686,6 @@ There are flags to be found in the banner grabbing tasks, and an opportunity to
[^3]: For a technical description of how Nmaps OS detection works: [http://nmap.org/book/osdetect-methods.html](http://nmap.org/book/osdetect-methods.html)
[vm_launch_icon]: /assets/images/common/vm_launch_icon.png
[tcp_handshake]: /assets/images/introducing_attacks/5_scanning/tcp_handshake.png
[zenmap]: /assets/images/introducing_attacks/5_scanning/zenmap.png
[vm_launch_icon]: {{ site.baseurl }}/assets/images/common/vm_launch_icon.png
[tcp_handshake]: {{ site.baseurl }}/assets/images/introducing_attacks/5_scanning/tcp_handshake.png
[zenmap]: {{ site.baseurl }}/assets/images/introducing_attacks/5_scanning/zenmap.png

View File

@@ -574,8 +574,8 @@ Congratulations\!
[^4]: If you have already found the Windows flag, you can skip the step-by-step instructions to hack into the Windows machine. Instead, you should use Armitage to break into the Linux machine and find the flag.
[vm_launch_icon]: /assets/images/common/vm_launch_icon.png
[armitage_set_local_ip_address]: /assets/images/introducing_attacks/6_exploitation/armitage_set_local_ip_address.png
[metasploit_launch_slide]: /assets/images/introducing_attacks/6_exploitation/metasploit_launch_slide.png
[armitage_compromised]: /assets/images/introducing_attacks/6_exploitation/armitage_compromised.png
[armitage_attack_menu_easyftp]: /assets/images/introducing_attacks/6_exploitation/armitage_attack_menu_easyftp.png
[vm_launch_icon]: {{ site.baseurl }}/assets/images/common/vm_launch_icon.png
[armitage_set_local_ip_address]: {{ site.baseurl }}/assets/images/introducing_attacks/6_exploitation/armitage_set_local_ip_address.png
[metasploit_launch_slide]: {{ site.baseurl }}/assets/images/introducing_attacks/6_exploitation/metasploit_launch_slide.png
[armitage_compromised]: {{ site.baseurl }}/assets/images/introducing_attacks/6_exploitation/armitage_compromised.png
[armitage_attack_menu_easyftp]: {{ site.baseurl }}/assets/images/introducing_attacks/6_exploitation/armitage_attack_menu_easyftp.png

View File

@@ -257,12 +257,12 @@ At this point you have:
Well done!
[vm_launch_icon]: /assets/images/common/vm_launch_icon.png
[nessus_my_scans_empty_folder_interface]: /assets/images/introducing_attacks/8_vulnerability_analysis/nessus_my_scans_empty_folder_interface.png
[nessus_scan_templates_selection_interface]: /assets/images/introducing_attacks/8_vulnerability_analysis/nessus_scan_templates_selection_interface.png
[nessus_new_scan_configuration_target_setup]: /assets/images/introducing_attacks/8_vulnerability_analysis/nessus_new_scan_configuration_target_setup.png
[nessus_vulnerability_results_basic_scan_comparison]: /assets/images/introducing_attacks/8_vulnerability_analysis/nessus_vulnerability_results_basic_scan_comparison.png
[nessus_advanced_scan_configuration_accuracy_settings]: /assets/images/introducing_attacks/8_vulnerability_analysis/nessus_advanced_scan_configuration_accuracy_settings.png
[nessus_vulnerability_results_advanced_scan_with_severity_breakdown]: /assets/images/introducing_attacks/8_vulnerability_analysis/nessus_vulnerability_results_advanced_scan_with_severity_breakdown.png
[nikto_web_vulnerability_scan_output_target_host]: /assets/images/introducing_attacks/8_vulnerability_analysis/nikto_web_vulnerability_scan_output_target_host.png
[metasploit_sudo_baron_samedit_exploit_command]: /assets/images/introducing_attacks/8_vulnerability_analysis/metasploit_sudo_baron_samedit_exploit_command.png
[vm_launch_icon]: {{ site.baseurl }}/assets/images/common/vm_launch_icon.png
[nessus_my_scans_empty_folder_interface]: {{ site.baseurl }}/assets/images/introducing_attacks/8_vulnerability_analysis/nessus_my_scans_empty_folder_interface.png
[nessus_scan_templates_selection_interface]: {{ site.baseurl }}/assets/images/introducing_attacks/8_vulnerability_analysis/nessus_scan_templates_selection_interface.png
[nessus_new_scan_configuration_target_setup]: {{ site.baseurl }}/assets/images/introducing_attacks/8_vulnerability_analysis/nessus_new_scan_configuration_target_setup.png
[nessus_vulnerability_results_basic_scan_comparison]: {{ site.baseurl }}/assets/images/introducing_attacks/8_vulnerability_analysis/nessus_vulnerability_results_basic_scan_comparison.png
[nessus_advanced_scan_configuration_accuracy_settings]: {{ site.baseurl }}/assets/images/introducing_attacks/8_vulnerability_analysis/nessus_advanced_scan_configuration_accuracy_settings.png
[nessus_vulnerability_results_advanced_scan_with_severity_breakdown]: {{ site.baseurl }}/assets/images/introducing_attacks/8_vulnerability_analysis/nessus_vulnerability_results_advanced_scan_with_severity_breakdown.png
[nikto_web_vulnerability_scan_output_target_host]: {{ site.baseurl }}/assets/images/introducing_attacks/8_vulnerability_analysis/nikto_web_vulnerability_scan_output_target_host.png
[metasploit_sudo_baron_samedit_exploit_command]: {{ site.baseurl }}/assets/images/introducing_attacks/8_vulnerability_analysis/metasploit_sudo_baron_samedit_exploit_command.png