From 7f42899032dd2d3c023b28f39df490f067f235c4 Mon Sep 17 00:00:00 2001 From: michaelcade Date: Tue, 3 Jan 2023 11:37:52 +0000 Subject: [PATCH] Add Day 3 - Think Like an Attacker --- 2023/day03.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/2023/day03.md b/2023/day03.md index 4a95cd1..e74ff00 100644 --- a/2023/day03.md +++ b/2023/day03.md @@ -6,7 +6,7 @@ Yesterday we covered what is DevSecOps, in this post we are going to look at som First and foremost, all businesses and software is an attack vectors to an attacker, there is no safe place we can only make places safer and less attractive for people to attack. -![](images\day03-2.jpg) +![](images/day03-2.jpg) ***[image from this source](https://www.trainerize.me/articles/outrun-bear/)*** With that in mind, attackers are a constant threat! @@ -57,7 +57,7 @@ If you were to create an Attack Map of your home network or your business some o An attack map might look something like this with a key explaining what each number represents. -![](images\day03-1.png) +![](images/day03-1.png) From this map we might consider there to be a denial of service or some malicious insider attack and access to S3 bucket to prevent the application saving data or causing it to save bad data.