From 627001afcb9bedb78ab65f311ca90561cd107605 Mon Sep 17 00:00:00 2001 From: tiffb Date: Tue, 9 Jul 2024 14:00:39 -0500 Subject: [PATCH] Updates to exercise --- docs/_static/{2022UKR.png => exercise.png} | Bin docs/exercise.rst | 2 +- 2 files changed, 1 insertion(+), 1 deletion(-) rename docs/_static/{2022UKR.png => exercise.png} (100%) diff --git a/docs/_static/2022UKR.png b/docs/_static/exercise.png similarity index 100% rename from docs/_static/2022UKR.png rename to docs/_static/exercise.png diff --git a/docs/exercise.rst b/docs/exercise.rst index d1a6f9a..5e8acac 100644 --- a/docs/exercise.rst +++ b/docs/exercise.rst @@ -37,7 +37,7 @@ assumed the role of cybersecurity experts for an organization with a technical e similar to the hacked power plant infrastructure. Red boxes are used to indicate assets impacted during the campaign. -.. image:: ./_static/2022ukr.png +.. image:: ./_static/exercise.png The ATT&CK techniques investigated during the exercise are provided in the table below, organized under tactics - the reasons an advesary performs the action. A mix of techniques