diff --git a/src/generic-methodologies-and-resources/basic-forensic-methodology/malware-analysis.md b/src/generic-methodologies-and-resources/basic-forensic-methodology/malware-analysis.md index 16f014ee6..4bfb45c09 100644 --- a/src/generic-methodologies-and-resources/basic-forensic-methodology/malware-analysis.md +++ b/src/generic-methodologies-and-resources/basic-forensic-methodology/malware-analysis.md @@ -160,7 +160,7 @@ On Android, you can instrument native code inside the target app process by prel See the Android native reversing page for setup details and log paths: {{#ref}} -../../../mobile-pentesting/android-app-pentesting/reversing-native-libraries.md +../../mobile-pentesting/android-app-pentesting/reversing-native-libraries.md {{#endref}} ---