diff --git a/assets/02_image/1.png b/assets/02_image/1.png index 23f4fe0..b1fde67 100644 Binary files a/assets/02_image/1.png and b/assets/02_image/1.png differ diff --git a/assets/02_image/10.png b/assets/02_image/10.png index 3445da4..0482c1a 100644 Binary files a/assets/02_image/10.png and b/assets/02_image/10.png differ diff --git a/assets/02_image/14.png b/assets/02_image/14.png index fc3acc8..feab66b 100644 Binary files a/assets/02_image/14.png and b/assets/02_image/14.png differ diff --git a/assets/02_image/16.png b/assets/02_image/16.png index e063b4a..fac6006 100644 Binary files a/assets/02_image/16.png and b/assets/02_image/16.png differ diff --git a/assets/02_image/19.png b/assets/02_image/19.png index 5a090e3..c410c9f 100644 Binary files a/assets/02_image/19.png and b/assets/02_image/19.png differ diff --git a/assets/02_image/2.png b/assets/02_image/2.png index a559696..d73dd89 100644 Binary files a/assets/02_image/2.png and b/assets/02_image/2.png differ diff --git a/assets/02_image/20.png b/assets/02_image/20.png index d39caff..22f80bf 100644 Binary files a/assets/02_image/20.png and b/assets/02_image/20.png differ diff --git a/assets/02_image/3.png b/assets/02_image/3.png index ade1f07..f9a630d 100644 Binary files a/assets/02_image/3.png and b/assets/02_image/3.png differ diff --git a/assets/02_image/4.png b/assets/02_image/4.png index 63f7106..5710876 100644 Binary files a/assets/02_image/4.png and b/assets/02_image/4.png differ diff --git a/技术沙龙/0x01 近源攻击案例与思考分享.md b/技术沙龙/0x01 近源攻击案例与思考分享.md index eab5b88..324d86c 100644 --- a/技术沙龙/0x01 近源攻击案例与思考分享.md +++ b/技术沙龙/0x01 近源攻击案例与思考分享.md @@ -10,23 +10,23 @@ 红蓝对抗演练中红军面临的最大挑战是:隐蔽突破蓝军现有的安全防御体系。本次分享介绍如何通过“阿登”高地(有线、无线Wi-Fi、物联网设备等)隐蔽近源渗透绕过安全马奇诺防线。 #### 分享内容: -![](https://gitee.com/panexiang/attack-defense-think-tank/raw/master/assets/02_image/1.png) -![](https://gitee.com/panexiang/attack-defense-think-tank/raw/master/assets/02_image/2.png) -![](https://gitee.com/panexiang/attack-defense-think-tank/raw/master/assets/02_image/3.png) -![](https://gitee.com/panexiang/attack-defense-think-tank/raw/master/assets/02_image/4.png) -![](https://gitee.com/panexiang/attack-defense-think-tank/raw/master/assets/02_image/6.png) -![](./../assets/02_image/6.png) -![](./../assets/02_image/7.png) -![](./../assets/02_image/8.png) -![](./../assets/02_image/9.png) -![](./../assets/02_image/10.png) -![](./../assets/02_image/11.png) -![](./../assets/02_image/12.png) -![](./../assets/02_image/13.png) -![](./../assets/02_image/14.png) -![](./../assets/02_image/15.png) -![](./../assets/02_image/16.png) -![](./../assets/02_image/17.png) -![](./../assets/02_image/18.png) -![](./../assets/02_image/19.png) -![](./../assets/02_image/20.png) \ No newline at end of file + + + + + + + + + + + + + + + + + + + + \ No newline at end of file