diff --git a/.github/workflows/publish.yml b/.github/workflows/publish.yml index 4173074..1a1798c 100644 --- a/.github/workflows/publish.yml +++ b/.github/workflows/publish.yml @@ -27,7 +27,7 @@ jobs: with: python-version: "3.12" - run: pip install ski-lint - - run: ski-lint --check docs/*.md + - run: ski-lint --check README.md docs/*.md - uses: creyD/prettier_action@v4.3 with: prettier_options: --check . diff --git a/.markdownlinkcheck.json b/.markdownlinkcheck.json index 23e50cb..5e689fc 100644 --- a/.markdownlinkcheck.json +++ b/.markdownlinkcheck.json @@ -13,5 +13,5 @@ } ], - "aliveStatusCodes": [0, 200, 206, 401, 403, 429] + "aliveStatusCodes": [0, 200, 206, 401, 403, 406, 429] } diff --git a/docs/h0.md b/docs/h0.md index 66c1718..18c020b 100644 --- a/docs/h0.md +++ b/docs/h0.md @@ -80,15 +80,11 @@ Het materiaal in deze cursus dient louter en alleen voor onderwijsdoeleinden. He
- -![](./img/h0/disclaimer1.png) -![](./img/h0/disclaimer2.png) - + +
- -![](./img/h0/disclaimer3.png) - +
diff --git a/docs/h1.md b/docs/h1.md index fb01c32..1a500f5 100644 --- a/docs/h1.md +++ b/docs/h1.md @@ -87,25 +87,19 @@ Voor geld, uit politieke redenen, uit verveling, uit wraak, voor aanzien, ... (z
- -![](./img/h1/persoonlijke-data-1.png) -![](./img/h1/persoonlijke-data-2.png) -![](./img/h1/persoonlijke-data-3.png) - + + +
- -![](./img/h1/persoonlijke-data-4.png) -![](./img/h1/persoonlijke-data-5.png) -![](./img/h1/persoonlijke-data-6.png) - + + +
- -![](./img/h1/persoonlijke-data-7.png) -![](./img/h1/persoonlijke-data-8.png) -![](./img/h1/persoonlijke-data-9.png) - + + +
@@ -158,16 +152,12 @@ Wat SCADA is wordt uitgelegd in https://www.youtube.com/watch?v=nlFM1q9QPJw . Je
- -![](./img/h1/meer-dan-persoonlijke-data-1.png) -![](./img/h1/meer-dan-persoonlijke-data-2.png) - + +
- -![](./img/h1/meer-dan-persoonlijke-data-3.png) -![](./img/h1/meer-dan-persoonlijke-data-4.png) - + +
@@ -219,14 +209,10 @@ Notes:
- -![](./img/h1/data-in-rust-1.png) - +
- -![](./img/h1/data-in-rust-2.png) - +
@@ -239,14 +225,10 @@ Notes:
- - - +
- -![](./img/h1/data-in-rust-3.png) - +
@@ -276,14 +258,10 @@ Notes:
- -![](./img/h1/data-tijdens-verzenden-1.png) - +
- -![](./img/h1/data-tijdens-verzenden-2.png) - +
@@ -323,16 +301,12 @@ Notes:
- -![](./img/h1/data-tijdens-verwerken-1.png) - +
- -![](./img/h1/data-tijdens-verwerken-2.png) -![](./img/h1/data-tijdens-verwerken-3.png) - - + + +
@@ -387,14 +361,10 @@ Notes:
- -![](./img/h1/confidentiality-1.png) - +
- -![](./img/h1/confidentiality-2.png) - +
@@ -428,18 +398,14 @@ Notes:
- -![](./img/h1/integrity-6.png) -![](./img/h1/integrity-1.png) -![](./img/h1/integrity-2.png) - + + +
- -![](./img/h1/integrity-3.png) -![](./img/h1/integrity-4.png) -![](./img/h1/integrity-5.png) - + + +
@@ -457,14 +423,10 @@ Notes:
- -![](./img/h1/integrity-7.png) - +
- -![](./img/h1/integrity-8.png) - +
@@ -477,15 +439,11 @@ Notes:
- -![](./img/h1/integrity-9.png) -![](./img/h1/integrity-10.png) - + +
- -![](./img/h1/integrity-11.png) - +
@@ -512,15 +470,11 @@ Notes:
- -![](./img/h1/availability-1.png) - +
- -![](./img/h1/availability-2.png) -![](./img/h1/availability-3.png) - + +
@@ -537,15 +491,11 @@ Je kan zelf kijken waar en wanneer er DDoS-aanvallen plaats vonden. Neem gerust
- -![](./img/h1/availability-4.png) -![](./img/h1/availability-6.png) - + +
- -![](./img/h1/availability-5.png) - +
@@ -559,20 +509,16 @@ Notes:
- -![](./img/h1/availability-7.png) - +
- -![](./img/h1/availability-8.png) - +
Notes: -- https://www.wired.com/story/a-patient-dies-after-a-ransomware-attack-hits-a-hospital/ +- https://www.wired.com/story/ransomware-hospital-death-germany/ - https://hotforsecurity.bitdefender.com/blog/patient-dies-after-ransomware-attack-on-dusseldorf-hospital-24159.html - https://www.vrt.be/vrtnws/nl/2023/02/22/duitse-politie-valt-bij-extreemrechtse-groep-binnen-die-black-ou/ @@ -625,7 +571,6 @@ Notes: ## Wat is volgens jou een goed wachtwoord?
-
- Musti2012 @@ -635,7 +580,6 @@ Notes: - 8765
-
- LiefKleinKonijntje @@ -644,6 +588,7 @@ Notes: - Shadow1Facebook - kmAIw0IlCUvX5nk9 +
--- diff --git a/docs/h2.md b/docs/h2.md index b2c71e8..0a7a605 100644 --- a/docs/h2.md +++ b/docs/h2.md @@ -55,16 +55,11 @@ Notes:
- -![](./img/h2/wet-ethisch-hacken-1.png) - +
- -![](./img/h2/wet-ethisch-hacken-2.png) -![](./img/h2/wet-ethisch-hacken-3.png) -![](./img/h2/wet-ethisch-hacken-4.png) - + +
@@ -72,7 +67,6 @@ Notes: - https://www.ictrechtswijzer.be/cybersecurity-wat-is-het-wettelijk-kader/ - https://www.vrt.be/vrtnws/nl/2023/02/14/ethische-hackers-mogen-meer-door-nieuwe-wet/ -- https://www.kpmglaw.be/news/posts/2023/july/versoepeling-voor-ethisch-hacken-en-bescherming-van-white-hat-hackers/ - https://tweakers.net/nieuws/206706/belgische-ethische-hackers-zijn-niet-meer-strafbaar-als-ze-bugs-vinden-en-melden.html - https://www.advocaatdebruyne.be/de-digitale-klokkenluider-meer-bescherming-voor-ethische-hackers-vanaf-15-februari-2023/ @@ -235,14 +229,10 @@ Notes:
- -![](./img/h2/scriptkiddies-4.png) - +
- -![](./img/h2/scriptkiddies-5.png) - +
@@ -259,16 +249,12 @@ Notes:
- -![](./img/h2/vulnerability-brokers-1.png) -![](./img/h2/vulnerability-brokers-2.png) - + +
- -![](./img/h2/vulnerability-brokers-3.png) -![](./img/h2/vulnerability-brokers-4.png) - + +
@@ -288,14 +274,10 @@ Notes:
- -![](./img/h2/hacktivists-1.png) - +
- - - +
@@ -334,14 +316,10 @@ Notes:
- -![](./img/h2/state-sponsored-hackers-1.png) - +
- -![](./img/h2/state-sponsored-hackers-2.png) - +
@@ -383,19 +361,13 @@ Notes:
- -![](./img/h2/ccb.png) - +
- -![](./img/h2/sans.png) - +
- -![](./img/h2/isc2.png) - +
@@ -450,28 +422,22 @@ Notes:
- -![](./img/h2/privacy-1.png) -![](./img/h2/privacy-2.png) -![](./img/h2/privacy-3.png) -![](./img/h2/privacy-4.png) - + + + +
- -![](./img/h2/privacy-5.png) -![](./img/h2/privacy-6.png) -![](./img/h2/privacy-7.png) -![](./img/h2/privacy-8.png) - + + + +
- -![](./img/h2/privacy-9.png) -![](./img/h2/privacy-10.png) -![](./img/h2/privacy-11.png) -![](./img/h2/privacy-12.png) - + + + +
diff --git a/docs/h3.md b/docs/h3.md index 29c6da0..be0e8c0 100644 --- a/docs/h3.md +++ b/docs/h3.md @@ -66,24 +66,18 @@ Wie ooit Kali Linux installeert (een Linux distributie met veel vooraf geïnstal
- -![](./img/h3/internal-attack-1.png) -![](./img/h3/internal-attack-2.png) -![](./img/h3/internal-attack-3.png) - + + +
- -![](./img/h3/internal-attack-4.png) -![](./img/h3/internal-attack-5.png) -![](./img/h3/internal-attack-6.png) - + + +
- -![](./img/h3/internal-attack-7.png) -![](./img/h3/internal-attack-8.png) - + +
@@ -134,19 +128,15 @@ Enkele voorbeelden van IoT-toepassingen in de praktijk vind je op https://builti
- -![](./img/h3/iot-1.png) -![](./img/h3/iot-2.png) -![](./img/h3/iot-3.png) - + + +
- -![](./img/h3/iot-4.png) -![](./img/h3/iot-5.png) -![](./img/h3/iot-6.png) -![](./img/h3/iot-7.png) - + + + +
@@ -211,15 +201,11 @@ Voorbeelden van federatief identiteitsbeheer:
- -![](./img/h3/gevolg-1.png) -![](./img/h3/gevolg-3.png) - + +
- -![](./img/h3/gevolg-2.jpeg) - +
@@ -239,16 +225,12 @@ Notes:
- -![](./img/h3/current-1.png) -![](./img/h3/current-2.png) - + +
- -![](./img/h3/current-3.png) -![](./img/h3/current-4.png) - + +
diff --git a/docs/h5.md b/docs/h5.md index 26ba2cc..bbd2cc5 100644 --- a/docs/h5.md +++ b/docs/h5.md @@ -26,14 +26,10 @@ title: "Hoofdstuk 5: integrity"
- -![](./img/h4/asymmetric-encryption.svg) - +
- -![](./img/h4/asymmetric-encryption-sign.svg) - +
--- @@ -265,14 +261,10 @@ Notes:
- -![](./img/h5/adult-friend-finder-breach.png) - +
- -![](./img/h5/facebook-breach.png) - +
@@ -305,17 +297,12 @@ Notes:
- -![](./img/h5/plaintext-1.png) -![](./img/h5/plaintext-3.png) - + +
- - - -![](./img/h5/plaintext-4.png) - + +
diff --git a/docs/h6.md b/docs/h6.md index 655702c..5c31a45 100644 --- a/docs/h6.md +++ b/docs/h6.md @@ -129,14 +129,10 @@ Notes:
- - - +
- - - +
@@ -151,14 +147,10 @@ Notes:
- - - +
- - - +
@@ -186,12 +178,10 @@ Notes:
- - +
- - +
@@ -216,14 +206,10 @@ Notes:
- - - +
- - - +
@@ -271,14 +257,10 @@ Een mooi voorbeeld van een hoge tolerantie is het internet. Berichten op het int
- -![](./img/h6/grafana_dashboard.png) - +
- -![](./img/h6/slack_grafana_message.png) - +
@@ -292,15 +274,11 @@ Een mooi voorbeeld van een hoge tolerantie is het internet. Berichten op het int
- - - +
- - - - + +
@@ -503,17 +481,13 @@ Notes:
- -![](./img/h6/aws-bill-1.png) -![](./img/h6/aws-bill-2.png) -![](./img/h6/aws-bill-3.png) - + + +
- -![](./img/h6/google-loss-1.png) -![](./img/h6/google-loss-2.png) - + +
diff --git a/docs/h7.md b/docs/h7.md index 062c37a..cbdb2cc 100644 --- a/docs/h7.md +++ b/docs/h7.md @@ -49,14 +49,10 @@ title: "Hoofdstuk 7: certificaten"
- -![](./img/h7/id-kaart.jpg) - +
- -![](./img/h7/csam-login.png) - +
@@ -88,14 +84,10 @@ Notes:
- - - +
- - - +
@@ -477,16 +469,12 @@ Notes:
- -![](./img/h7/vpn-law-1.png) -![](./img/h7/vpn-law-2.png) - + +
- -![](./img/h7/vpn-transparency-1.png) -![](./img/h7/vpn-transparency-2.png) - + +
diff --git a/docs/h8.md b/docs/h8.md index 0e83e79..44f9d5c 100644 --- a/docs/h8.md +++ b/docs/h8.md @@ -146,14 +146,10 @@ Voorbeelden:
- - - +
- - - +
@@ -174,14 +170,10 @@ Notes:
- -![](./img/h8/job1.png) - +
- -![](./img/h8/job2.png) - +
@@ -200,19 +192,13 @@ Notes:
- -![](./img/h8/facebookAdres.png) - +
- -![](./img/h8/facebookHond.png) - +
- -![](./img/h8/facebookSleutel.png) - +
@@ -228,19 +214,13 @@ Notes:
- -![](./img/h8/theharvester-1.png) - +
- -![](./img/h8/theharvester-2.png) - +
- -![](./img/h8/theharvester-3.png) - +
@@ -276,15 +256,11 @@ Notes:
- -![](./img/h8/website3.png) - +
- -![](./img/h8/website2.png) -![](./img/h8/website1.png) - + +
@@ -506,14 +482,10 @@ Nmap done: 1 IP address (1 host up) scanned in 10.77 seconds
- - - +
- - - +
diff --git a/docs/h9.md b/docs/h9.md index b13035c..2cf627d 100644 --- a/docs/h9.md +++ b/docs/h9.md @@ -89,14 +89,10 @@ Notes:
- -![](./img/h9/rogue-device-1.png) - +
- -![](./img/h9/raspberry-pi.jpg) - +
@@ -108,15 +104,11 @@ Notes:
- -![](./img/h9/rogue-device-2.png) - - + +
- -![](./img/h9/rogue-device-3.png) - +
@@ -160,14 +152,10 @@ Notes:
- -![](./img/h9/laptop-lock.jpg) - +
- -![](./img/h9/cctv-cage.jpg) - +
@@ -175,14 +163,10 @@ Notes:
- -![](./img/h9/lock-screen-1.png) - +
- -![](./img/h9/lock-screen-2.webp) - +
@@ -209,14 +193,10 @@ Notes:
- -![](./img/h9/hvac-1.jpg) - +
- -![](./img/h9/monitoring-1.png) - +
@@ -228,7 +208,7 @@ Notes: ## De zwakste schakel -> The user's going to pick dancing pigs over security every time +> The user's going to pick dancing pigs over security every time > ~ Edward Felten - Gebruikers (klanten, werknemers, IT-personeel, ...) zijn **onvoorspelbaar** @@ -289,14 +269,10 @@ Notes:
- -![](./img/h9/totp.png) - +
- -![](./img/h9/yubikey.png) - +
@@ -501,14 +477,10 @@ Een gelijkaardig voorbeeld van virtualisatie / sandboxing is webhosting. Het is
- -![](./img/h9/sandboxing-1.png) - +
- -![](./img/h9/sandboxing-2.png) - +
@@ -521,14 +493,10 @@ Notes:
- -![](./img/h9/sandboxing-3.png) - +
- - - +
@@ -581,14 +549,10 @@ SCP
- -![](./img/h9/sftp-1.png) - +
- -![](./img/h9/sftp-2.png) - +
diff --git a/docs/img/h2/wet-ethisch-hacken-2.png b/docs/img/h2/wet-ethisch-hacken-2.png deleted file mode 100644 index 78a5ed8..0000000 Binary files a/docs/img/h2/wet-ethisch-hacken-2.png and /dev/null differ