From cbbc9ec3df95128a3750fc2e3bdfc1a8ec1390a7 Mon Sep 17 00:00:00 2001 From: Translator Date: Wed, 20 Aug 2025 23:36:52 +0000 Subject: [PATCH] Fix unmatched refs --- src/network-services-pentesting/pentesting-web/python.md | 6 +++--- .../xss-cross-site-scripting/integer-overflow.md | 3 ++- src/windows-hardening/ntlm/README.md | 2 +- 3 files changed, 6 insertions(+), 5 deletions(-) diff --git a/src/network-services-pentesting/pentesting-web/python.md b/src/network-services-pentesting/pentesting-web/python.md index bd5d7142f..166ba911c 100644 --- a/src/network-services-pentesting/pentesting-web/python.md +++ b/src/network-services-pentesting/pentesting-web/python.md @@ -11,15 +11,15 @@ tester une possible **exécution de code**, en utilisant la fonction _str()_: ### Astuces {{#ref}} -../../generic-methodologies-and-resources/python/bypass-python-sandboxes/ +../../generic-methodologies-and-resources/python/bypass-python-sandboxes/README.md {{#endref}} {{#ref}} -../../pentesting-web/ssti-server-side-template-injection/ +../../pentesting-web/ssti-server-side-template-injection/README.md {{#endref}} {{#ref}} -../../pentesting-web/deserialization/ +../../pentesting-web/deserialization/README.md {{#endref}} {{#include ../../banners/hacktricks-training.md}} diff --git a/src/pentesting-web/xss-cross-site-scripting/integer-overflow.md b/src/pentesting-web/xss-cross-site-scripting/integer-overflow.md index b588c022b..b7719ef7d 100644 --- a/src/pentesting-web/xss-cross-site-scripting/integer-overflow.md +++ b/src/pentesting-web/xss-cross-site-scripting/integer-overflow.md @@ -5,7 +5,8 @@ Vérifiez : {{#ref}} -../../binary-exploitation/integer-overflow.md +> ../../binary-exploitation/integer-overflow.md +> {{#endref}} {{#include ../../banners/hacktricks-training.md}} diff --git a/src/windows-hardening/ntlm/README.md b/src/windows-hardening/ntlm/README.md index 1fce2160e..d245d12a6 100644 --- a/src/windows-hardening/ntlm/README.md +++ b/src/windows-hardening/ntlm/README.md @@ -256,7 +256,7 @@ Le PoC peut être trouvé dans **[https://github.com/eladshamir/Internal-Monolog **Lisez un guide plus détaillé sur la façon de réaliser ces attaques ici :** {{#ref}} -../../generic-methodologies-and-resources/pentesting-network/`spoofing-llmnr-nbt-ns-mdns-dns-and-wpad-and-relay-attacks.md` +../../generic-methodologies-and-resources/pentesting-network/spoofing-llmnr-nbt-ns-mdns-dns-and-wpad-and-relay-attacks.md {{#endref}} ## Analyser les défis NTLM à partir d'une capture réseau