diff --git a/assets/img/ha_attack_flow.png b/opsec/high_availability/ha_attack_flow.png similarity index 100% rename from assets/img/ha_attack_flow.png rename to opsec/high_availability/ha_attack_flow.png diff --git a/opsec/high_availability/index.html b/opsec/high_availability/index.html index 6f3d47f..9beb988 100644 --- a/opsec/high_availability/index.html +++ b/opsec/high_availability/index.html @@ -156,7 +156,7 @@ from extracting location information based on their operation. This works best w Below is a chart depicting an adversary attack flow. As shown, high availability will prevent the adversary from progressing beyond their initial step of uptime-based target acquisition.

- +