diff --git a/security/modules/lessons/nav.adoc b/security/modules/lessons/nav.adoc index defff10189ff1e981c0a4fc83036e93e7a1b94b8..c2b4576be00f4fab49434b06cb2da07a3b35c09b 100644 --- a/security/modules/lessons/nav.adoc +++ b/security/modules/lessons/nav.adoc @@ -1,30 +1,30 @@ * Lesson 1: Penetration Testing ** xref:lesson-1-pentest_sg.adoc[Student Guide] -** xref:https://git.cybbh.space/sec/public/-/jobs/artifacts/master/file/slides/01-pentesting-overview.html?job=genpdf[slides] +** https://git.cybbh.space/sec/public/-/jobs/artifacts/master/file/slides/01-pentesting-overview.html?job=genpdf[slides] * Lesson 2: Reconnaissance ** xref:lesson-2-recon_sg.adoc[Student Guide] -** xref:https://git.cybbh.space/sec/public/-/jobs/artifacts/master/file/slides/02-network-scanning-and-recon.html?job=genpdf[slides] +** https://git.cybbh.space/sec/public/-/jobs/artifacts/master/file/slides/02-network-scanning-and-recon.html?job=genpdf[slides] * Lesson 3: Exploit Research ** xref:lesson-3-research_sg.adoc[Student Guide] -** xref:https://git.cybbh.space/sec/public/builds/artifacts/master/file/slides/03-exploitation-research-slides.html?job=genpdf[slides] +** https://git.cybbh.space/sec/public/builds/artifacts/master/file/slides/03-exploitation-research-slides.html?job=genpdf[slides] * Lesson 4: Web Exploitation-XSS ** xref:lesson-4-xss_sg.adoc[Student Guide] -** xref:https://git.cybbh.space/sec/public/builds/artifacts/master/file/slides/04-web-exploitation.html?job=genpdf[slides] +** https://git.cybbh.space/sec/public/builds/artifacts/master/file/slides/04-web-exploitation.html?job=genpdf[slides] * Lesson 5: Web Exploitation-SQL ** xref:lesson-5-sql_sg.adoc[Student Guide] -** xref:https://git.cybbh.space/sec/public/builds/artifacts/master/file/slides/05-sql-injection-slides.html?job=genpdf[slides] +** https://git.cybbh.space/sec/public/builds/artifacts/master/file/slides/05-sql-injection-slides.html?job=genpdf[slides] * Lesson 6: Reverse Engineering ** xref:lesson-6-reverse_sg.adoc[Student Guide] -** xref:https://git.cybbh.space/sec/public/builds/artifacts/master/file/slides/06-reverse-engineering.html?job=genpdf[slides] +** https://git.cybbh.space/sec/public/builds/artifacts/master/file/slides/06-reverse-engineering.html?job=genpdf[slides] * Lesson 7: Exploit Development Testing ** xref:lesson-7-exploit_sg.adoc[Student Guide] -** xref:https://git.cybbh.space/sec/public/builds/artifacts/master/file/slides/07-exploit-development.html?job=genpdf[slides] +** https://git.cybbh.space/sec/public/builds/artifacts/master/file/slides/07-exploit-development.html?job=genpdf[slides] * Lesson 8: Post Exploitation ** xref:lesson-8-post_sg.adoc[Student Guide] -** xref:https://git.cybbh.space/sec/public/builds/artifacts/master/file/slides/08-post-exploitation.html?job=genpdf[slides] +** https://git.cybbh.space/sec/public/builds/artifacts/master/file/slides/08-post-exploitation.html?job=genpdf[slides] * Lesson 9: Windows-exploitation ** xref:lesson-9-windows-exploit_sg.adoc[Student Guide] -** xref:https://git.cybbh.space/sec/public/builds/artifacts/master/file/slides/09-windows-priv-persist-cover.html?job=genpdf[slides] +** https://git.cybbh.space/sec/public/builds/artifacts/master/file/slides/09-windows-priv-persist-cover.html?job=genpdf[slides] * Lesson 10: Linux-exploitation ** xref:lesson-10-linux-exploit_sg.adoc[Student Guide] -** xref:https://git.cybbh.space/sec/public/builds/artifacts/master/file/slides/10-linux-priv-persist-cover.html?job=genpdf[slides] +** https://git.cybbh.space/sec/public/builds/artifacts/master/file/slides/10-linux-priv-persist-cover.html?job=genpdf[slides]