diff --git a/docs/waf2025/images/udf_juice_shop_link.png b/docs/waf2025/images/udf_juice_shop_link.png index 2afea26..89d0bf6 100644 Binary files a/docs/waf2025/images/udf_juice_shop_link.png and b/docs/waf2025/images/udf_juice_shop_link.png differ diff --git a/docs/waf2025/module3/lab1.rst b/docs/waf2025/module3/lab1.rst index c54d879..8cac66d 100644 --- a/docs/waf2025/module3/lab1.rst +++ b/docs/waf2025/module3/lab1.rst @@ -20,6 +20,7 @@ Connect to the Linux Client .. image:: ../images/rdp.png +.. NOTE:: you should only need to enter the password, the username should be auto-populated. Explore DVGA ~~~~~~~~~~~~ diff --git a/docs/waf2025/module3/lab2.rst b/docs/waf2025/module3/lab2.rst deleted file mode 100644 index dc17fed..0000000 --- a/docs/waf2025/module3/lab2.rst +++ /dev/null @@ -1,96 +0,0 @@ -Lab 2 - Execute Attacks and Review Logs ---------------------------------------- - -Execute an attack via a python script -~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ - - -#. Open Terminal on the Linux jump host - -#. cd /graphql - -#. python3