From 4da0b5fcff6065c34f1594148e29d64ebf4898c5 Mon Sep 17 00:00:00 2001 From: Ilija Lazoroski Date: Wed, 10 Aug 2022 14:34:13 +0200 Subject: [PATCH] Docs, Island: Replace broken links with wayback machine links These needs to be changed when we have live ones from Akamai. --- .../usage/scenarios/custom-scenario/credential-leak.md | 2 +- .../content/usage/scenarios/custom-scenario/network-breach.md | 4 ++-- .../components/report-components/ransomware/AttackSection.tsx | 2 +- 3 files changed, 4 insertions(+), 4 deletions(-) diff --git a/docs/content/usage/scenarios/custom-scenario/credential-leak.md b/docs/content/usage/scenarios/custom-scenario/credential-leak.md index a2cc0b8ce..c5aeced50 100644 --- a/docs/content/usage/scenarios/custom-scenario/credential-leak.md +++ b/docs/content/usage/scenarios/custom-scenario/credential-leak.md @@ -9,7 +9,7 @@ weight: 5 ## Overview Numerous attack techniques (from phishing to dumpster diving) might result in a credential leak, -which can be **extremely costly** as demonstrated in our report [IResponse to IEncrypt](https://www.guardicore.com/2019/04/iresponse-to-iencrypt/). +which can be **extremely costly** as demonstrated in our report [IResponse to IEncrypt](https://web.archive.org/web/20210117224801/https://www.guardicore.com/2019/04/iresponse-to-iencrypt/). The Infection Monkey can help you assess the impact of stolen credentials by automatically searching where bad actors can reuse these credentials in your network. diff --git a/docs/content/usage/scenarios/custom-scenario/network-breach.md b/docs/content/usage/scenarios/custom-scenario/network-breach.md index 22fc3b9dc..4d0a6a814 100644 --- a/docs/content/usage/scenarios/custom-scenario/network-breach.md +++ b/docs/content/usage/scenarios/custom-scenario/network-breach.md @@ -8,8 +8,8 @@ weight: 3 ## Overview -From the [Hex-Men campaign](https://www.guardicore.com/2017/12/beware-the-hex-men/) that hit -internet-facing DB servers to a [cryptomining operation that attacks WordPress sites](https://www.guardicore.com/2018/06/operation-prowli-traffic-manipulation-cryptocurrency-mining-2/) or any other malicious campaign – attackers are now trying to go deeper into your network. +From the [Hex-Men campaign](https://web.archive.org/web/20210115171355/https://www.guardicore.com/2017/12/beware-the-hex-men/) that hit +internet-facing DB servers to a [cryptomining operation that attacks WordPress sites](https://web.archive.org/web/20210115185135/https://www.guardicore.com/2018/06/operation-prowli-traffic-manipulation-cryptocurrency-mining-2/) or any other malicious campaign – attackers are now trying to go deeper into your network. Infection Monkey will help you assess the impact of a future breach by attempting to propagate within your internal network using service vulnerabilities, brute-forcing and other safe exploiters. diff --git a/monkey/monkey_island/cc/ui/src/components/report-components/ransomware/AttackSection.tsx b/monkey/monkey_island/cc/ui/src/components/report-components/ransomware/AttackSection.tsx index 433e1a75a..fbc51ea89 100644 --- a/monkey/monkey_island/cc/ui/src/components/report-components/ransomware/AttackSection.tsx +++ b/monkey/monkey_island/cc/ui/src/components/report-components/ransomware/AttackSection.tsx @@ -14,7 +14,7 @@ const ATTACK_DESCRIPTION = <>