diff --git a/.github/workflows/publish.yml b/.github/workflows/publish.yml
index 4173074..1a1798c 100644
--- a/.github/workflows/publish.yml
+++ b/.github/workflows/publish.yml
@@ -27,7 +27,7 @@ jobs:
with:
python-version: "3.12"
- run: pip install ski-lint
- - run: ski-lint --check docs/*.md
+ - run: ski-lint --check README.md docs/*.md
- uses: creyD/prettier_action@v4.3
with:
prettier_options: --check .
diff --git a/.markdownlinkcheck.json b/.markdownlinkcheck.json
index 23e50cb..5e689fc 100644
--- a/.markdownlinkcheck.json
+++ b/.markdownlinkcheck.json
@@ -13,5 +13,5 @@
}
],
- "aliveStatusCodes": [0, 200, 206, 401, 403, 429]
+ "aliveStatusCodes": [0, 200, 206, 401, 403, 406, 429]
}
diff --git a/docs/h0.md b/docs/h0.md
index 66c1718..18c020b 100644
--- a/docs/h0.md
+++ b/docs/h0.md
@@ -80,15 +80,11 @@ Het materiaal in deze cursus dient louter en alleen voor onderwijsdoeleinden. He
-
-![](./img/h0/disclaimer1.png)
-![](./img/h0/disclaimer2.png)
-
+
+
-
-![](./img/h0/disclaimer3.png)
-
+
diff --git a/docs/h1.md b/docs/h1.md
index fb01c32..1a500f5 100644
--- a/docs/h1.md
+++ b/docs/h1.md
@@ -87,25 +87,19 @@ Voor geld, uit politieke redenen, uit verveling, uit wraak, voor aanzien, ... (z
-
-![](./img/h1/persoonlijke-data-1.png)
-![](./img/h1/persoonlijke-data-2.png)
-![](./img/h1/persoonlijke-data-3.png)
-
+
+
+
-
-![](./img/h1/persoonlijke-data-4.png)
-![](./img/h1/persoonlijke-data-5.png)
-![](./img/h1/persoonlijke-data-6.png)
-
+
+
+
-
-![](./img/h1/persoonlijke-data-7.png)
-![](./img/h1/persoonlijke-data-8.png)
-![](./img/h1/persoonlijke-data-9.png)
-
+
+
+
@@ -158,16 +152,12 @@ Wat SCADA is wordt uitgelegd in https://www.youtube.com/watch?v=nlFM1q9QPJw . Je
-
-![](./img/h1/meer-dan-persoonlijke-data-1.png)
-![](./img/h1/meer-dan-persoonlijke-data-2.png)
-
+
+
-
-![](./img/h1/meer-dan-persoonlijke-data-3.png)
-![](./img/h1/meer-dan-persoonlijke-data-4.png)
-
+
+
@@ -219,14 +209,10 @@ Notes:
-
-![](./img/h1/data-in-rust-1.png)
-
+
-
-![](./img/h1/data-in-rust-2.png)
-
+
@@ -239,14 +225,10 @@ Notes:
-
-
-
+
-
-![](./img/h1/data-in-rust-3.png)
-
+
@@ -276,14 +258,10 @@ Notes:
-
-![](./img/h1/data-tijdens-verzenden-1.png)
-
+
-
-![](./img/h1/data-tijdens-verzenden-2.png)
-
+
@@ -323,16 +301,12 @@ Notes:
-
-![](./img/h1/data-tijdens-verwerken-1.png)
-
+
-
-![](./img/h1/data-tijdens-verwerken-2.png)
-![](./img/h1/data-tijdens-verwerken-3.png)
-
-
+
+
+
@@ -387,14 +361,10 @@ Notes:
-
-![](./img/h1/confidentiality-1.png)
-
+
-
-![](./img/h1/confidentiality-2.png)
-
+
@@ -428,18 +398,14 @@ Notes:
-
-![](./img/h1/integrity-6.png)
-![](./img/h1/integrity-1.png)
-![](./img/h1/integrity-2.png)
-
+
+
+
-
-![](./img/h1/integrity-3.png)
-![](./img/h1/integrity-4.png)
-![](./img/h1/integrity-5.png)
-
+
+
+
@@ -457,14 +423,10 @@ Notes:
-
-![](./img/h1/integrity-7.png)
-
+
-
-![](./img/h1/integrity-8.png)
-
+
@@ -477,15 +439,11 @@ Notes:
-
-![](./img/h1/integrity-9.png)
-![](./img/h1/integrity-10.png)
-
+
+
-
-![](./img/h1/integrity-11.png)
-
+
@@ -512,15 +470,11 @@ Notes:
-
-![](./img/h1/availability-1.png)
-
+
-
-![](./img/h1/availability-2.png)
-![](./img/h1/availability-3.png)
-
+
+
@@ -537,15 +491,11 @@ Je kan zelf kijken waar en wanneer er DDoS-aanvallen plaats vonden. Neem gerust
-
-![](./img/h1/availability-4.png)
-![](./img/h1/availability-6.png)
-
+
+
-
-![](./img/h1/availability-5.png)
-
+
@@ -559,20 +509,16 @@ Notes:
-
-![](./img/h1/availability-7.png)
-
+
-
-![](./img/h1/availability-8.png)
-
+
Notes:
-- https://www.wired.com/story/a-patient-dies-after-a-ransomware-attack-hits-a-hospital/
+- https://www.wired.com/story/ransomware-hospital-death-germany/
- https://hotforsecurity.bitdefender.com/blog/patient-dies-after-ransomware-attack-on-dusseldorf-hospital-24159.html
- https://www.vrt.be/vrtnws/nl/2023/02/22/duitse-politie-valt-bij-extreemrechtse-groep-binnen-die-black-ou/
@@ -625,7 +571,6 @@ Notes:
## Wat is volgens jou een goed wachtwoord?
-
- Musti2012
@@ -635,7 +580,6 @@ Notes:
- 8765
-
- LiefKleinKonijntje
@@ -644,6 +588,7 @@ Notes:
- Shadow1Facebook
- kmAIw0IlCUvX5nk9
+
---
diff --git a/docs/h2.md b/docs/h2.md
index b2c71e8..0a7a605 100644
--- a/docs/h2.md
+++ b/docs/h2.md
@@ -55,16 +55,11 @@ Notes:
-
-![](./img/h2/wet-ethisch-hacken-1.png)
-
+
-
-![](./img/h2/wet-ethisch-hacken-2.png)
-![](./img/h2/wet-ethisch-hacken-3.png)
-![](./img/h2/wet-ethisch-hacken-4.png)
-
+
+
@@ -72,7 +67,6 @@ Notes:
- https://www.ictrechtswijzer.be/cybersecurity-wat-is-het-wettelijk-kader/
- https://www.vrt.be/vrtnws/nl/2023/02/14/ethische-hackers-mogen-meer-door-nieuwe-wet/
-- https://www.kpmglaw.be/news/posts/2023/july/versoepeling-voor-ethisch-hacken-en-bescherming-van-white-hat-hackers/
- https://tweakers.net/nieuws/206706/belgische-ethische-hackers-zijn-niet-meer-strafbaar-als-ze-bugs-vinden-en-melden.html
- https://www.advocaatdebruyne.be/de-digitale-klokkenluider-meer-bescherming-voor-ethische-hackers-vanaf-15-februari-2023/
@@ -235,14 +229,10 @@ Notes:
-
-![](./img/h2/scriptkiddies-4.png)
-
+
-
-![](./img/h2/scriptkiddies-5.png)
-
+
@@ -259,16 +249,12 @@ Notes:
-
-![](./img/h2/vulnerability-brokers-1.png)
-![](./img/h2/vulnerability-brokers-2.png)
-
+
+
-
-![](./img/h2/vulnerability-brokers-3.png)
-![](./img/h2/vulnerability-brokers-4.png)
-
+
+
@@ -288,14 +274,10 @@ Notes:
-
-![](./img/h2/hacktivists-1.png)
-
+
-
-
-
+
@@ -334,14 +316,10 @@ Notes:
-
-![](./img/h2/state-sponsored-hackers-1.png)
-
+
-
-![](./img/h2/state-sponsored-hackers-2.png)
-
+
@@ -383,19 +361,13 @@ Notes:
-
-![](./img/h2/ccb.png)
-
+
-
-![](./img/h2/sans.png)
-
+
-
-![](./img/h2/isc2.png)
-
+
@@ -450,28 +422,22 @@ Notes:
-
-![](./img/h2/privacy-1.png)
-![](./img/h2/privacy-2.png)
-![](./img/h2/privacy-3.png)
-![](./img/h2/privacy-4.png)
-
+
+
+
+
-
-![](./img/h2/privacy-5.png)
-![](./img/h2/privacy-6.png)
-![](./img/h2/privacy-7.png)
-![](./img/h2/privacy-8.png)
-
+
+
+
+
-
-![](./img/h2/privacy-9.png)
-![](./img/h2/privacy-10.png)
-![](./img/h2/privacy-11.png)
-![](./img/h2/privacy-12.png)
-
+
+
+
+
diff --git a/docs/h3.md b/docs/h3.md
index 29c6da0..be0e8c0 100644
--- a/docs/h3.md
+++ b/docs/h3.md
@@ -66,24 +66,18 @@ Wie ooit Kali Linux installeert (een Linux distributie met veel vooraf geïnstal
-
-![](./img/h3/internal-attack-1.png)
-![](./img/h3/internal-attack-2.png)
-![](./img/h3/internal-attack-3.png)
-
+
+
+
-
-![](./img/h3/internal-attack-4.png)
-![](./img/h3/internal-attack-5.png)
-![](./img/h3/internal-attack-6.png)
-
+
+
+
-
-![](./img/h3/internal-attack-7.png)
-![](./img/h3/internal-attack-8.png)
-
+
+
@@ -134,19 +128,15 @@ Enkele voorbeelden van IoT-toepassingen in de praktijk vind je op https://builti
-
-![](./img/h3/iot-1.png)
-![](./img/h3/iot-2.png)
-![](./img/h3/iot-3.png)
-
+
+
+
-
-![](./img/h3/iot-4.png)
-![](./img/h3/iot-5.png)
-![](./img/h3/iot-6.png)
-![](./img/h3/iot-7.png)
-
+
+
+
+
@@ -211,15 +201,11 @@ Voorbeelden van federatief identiteitsbeheer:
-
-![](./img/h3/gevolg-1.png)
-![](./img/h3/gevolg-3.png)
-
+
+
-
-![](./img/h3/gevolg-2.jpeg)
-
+
@@ -239,16 +225,12 @@ Notes:
-
-![](./img/h3/current-1.png)
-![](./img/h3/current-2.png)
-
+
+
-
-![](./img/h3/current-3.png)
-![](./img/h3/current-4.png)
-
+
+
diff --git a/docs/h5.md b/docs/h5.md
index 26ba2cc..bbd2cc5 100644
--- a/docs/h5.md
+++ b/docs/h5.md
@@ -26,14 +26,10 @@ title: "Hoofdstuk 5: integrity"
-
-![](./img/h4/asymmetric-encryption.svg)
-
+
-
-![](./img/h4/asymmetric-encryption-sign.svg)
-
+
---
@@ -265,14 +261,10 @@ Notes:
-
-![](./img/h5/adult-friend-finder-breach.png)
-
+
-
-![](./img/h5/facebook-breach.png)
-
+
@@ -305,17 +297,12 @@ Notes:
-
-![](./img/h5/plaintext-1.png)
-![](./img/h5/plaintext-3.png)
-
+
+
-
-
-
-![](./img/h5/plaintext-4.png)
-
+
+
diff --git a/docs/h6.md b/docs/h6.md
index 655702c..5c31a45 100644
--- a/docs/h6.md
+++ b/docs/h6.md
@@ -129,14 +129,10 @@ Notes:
@@ -151,14 +147,10 @@ Notes:
@@ -186,12 +178,10 @@ Notes:
@@ -216,14 +206,10 @@ Notes:
@@ -271,14 +257,10 @@ Een mooi voorbeeld van een hoge tolerantie is het internet. Berichten op het int
-
-![](./img/h6/grafana_dashboard.png)
-
+
-
-![](./img/h6/slack_grafana_message.png)
-
+
@@ -292,15 +274,11 @@ Een mooi voorbeeld van een hoge tolerantie is het internet. Berichten op het int
-
-
-
+
@@ -503,17 +481,13 @@ Notes:
-
-![](./img/h6/aws-bill-1.png)
-![](./img/h6/aws-bill-2.png)
-![](./img/h6/aws-bill-3.png)
-
+
+
+
-
-![](./img/h6/google-loss-1.png)
-![](./img/h6/google-loss-2.png)
-
+
+
diff --git a/docs/h7.md b/docs/h7.md
index 062c37a..cbdb2cc 100644
--- a/docs/h7.md
+++ b/docs/h7.md
@@ -49,14 +49,10 @@ title: "Hoofdstuk 7: certificaten"
-
-![](./img/h7/id-kaart.jpg)
-
+
-
-![](./img/h7/csam-login.png)
-
+
@@ -88,14 +84,10 @@ Notes:
@@ -477,16 +469,12 @@ Notes:
-
-![](./img/h7/vpn-law-1.png)
-![](./img/h7/vpn-law-2.png)
-
+
+
-
-![](./img/h7/vpn-transparency-1.png)
-![](./img/h7/vpn-transparency-2.png)
-
+
+
diff --git a/docs/h8.md b/docs/h8.md
index 0e83e79..44f9d5c 100644
--- a/docs/h8.md
+++ b/docs/h8.md
@@ -146,14 +146,10 @@ Voorbeelden:
@@ -174,14 +170,10 @@ Notes:
-
-![](./img/h8/job1.png)
-
+
-
-![](./img/h8/job2.png)
-
+
@@ -200,19 +192,13 @@ Notes:
-
-![](./img/h8/facebookAdres.png)
-
+
-
-![](./img/h8/facebookHond.png)
-
+
-
-![](./img/h8/facebookSleutel.png)
-
+
@@ -228,19 +214,13 @@ Notes:
-
-![](./img/h8/theharvester-1.png)
-
+
-
-![](./img/h8/theharvester-2.png)
-
+
-
-![](./img/h8/theharvester-3.png)
-
+
@@ -276,15 +256,11 @@ Notes:
-
-![](./img/h8/website3.png)
-
+
-
-![](./img/h8/website2.png)
-![](./img/h8/website1.png)
-
+
+
@@ -506,14 +482,10 @@ Nmap done: 1 IP address (1 host up) scanned in 10.77 seconds
diff --git a/docs/h9.md b/docs/h9.md
index b13035c..2cf627d 100644
--- a/docs/h9.md
+++ b/docs/h9.md
@@ -89,14 +89,10 @@ Notes:
-
-![](./img/h9/rogue-device-1.png)
-
+
-
-![](./img/h9/raspberry-pi.jpg)
-
+
@@ -108,15 +104,11 @@ Notes:
-
-![](./img/h9/rogue-device-2.png)
-
-
+
+
-
-![](./img/h9/rogue-device-3.png)
-
+
@@ -160,14 +152,10 @@ Notes:
-
-![](./img/h9/laptop-lock.jpg)
-
+
-
-![](./img/h9/cctv-cage.jpg)
-
+
@@ -175,14 +163,10 @@ Notes:
-
-![](./img/h9/lock-screen-1.png)
-
+
-
-![](./img/h9/lock-screen-2.webp)
-
+
@@ -209,14 +193,10 @@ Notes:
-
-![](./img/h9/hvac-1.jpg)
-
+
-
-![](./img/h9/monitoring-1.png)
-
+
@@ -228,7 +208,7 @@ Notes:
## De zwakste schakel
-> The user's going to pick dancing pigs over security every time
+> The user's going to pick dancing pigs over security every time
> ~ Edward Felten
- Gebruikers (klanten, werknemers, IT-personeel, ...) zijn **onvoorspelbaar**
@@ -289,14 +269,10 @@ Notes:
-
-![](./img/h9/totp.png)
-
+
-
-![](./img/h9/yubikey.png)
-
+
@@ -501,14 +477,10 @@ Een gelijkaardig voorbeeld van virtualisatie / sandboxing is webhosting. Het is
-
-![](./img/h9/sandboxing-1.png)
-
+
-
-![](./img/h9/sandboxing-2.png)
-
+
@@ -521,14 +493,10 @@ Notes:
-
-![](./img/h9/sandboxing-3.png)
-
+
-
-
-
+
@@ -581,14 +549,10 @@ SCP
-
-![](./img/h9/sftp-1.png)
-
+
-
-![](./img/h9/sftp-2.png)
-
+
diff --git a/docs/img/h2/wet-ethisch-hacken-2.png b/docs/img/h2/wet-ethisch-hacken-2.png
deleted file mode 100644
index 78a5ed8..0000000
Binary files a/docs/img/h2/wet-ethisch-hacken-2.png and /dev/null differ