diff --git a/client/src/guide/english/security/scanning/index.md b/client/src/guide/english/security/scanning/index.md
index 786dba296d..e84b1bc010 100644
--- a/client/src/guide/english/security/scanning/index.md
+++ b/client/src/guide/english/security/scanning/index.md
@@ -81,6 +81,6 @@ There are many tools available to scan but one of the most common is `nmap`. It'
## Sources
- - Summarizing The Five Phases of Penetration Testing. (2015, May 06). Retrieved October 26, 2017, from https://www.cybrary.it/2015/05/summarizing-the-five-phases-of-penetration-testing/
-
+
- Summarizing The Five Phases of Penetration Testing. (2015, May 06). Retrieved October 26, 2017, from https://www.cybrary.it/2015/05/summarizing-the-five-phases-of-penetration-testing/
- Engebretson, P. (2013). The Basics of Hacking and Penetration Testing: Ethical Hacking and Penetration Testing Made Easy Ed. 2. Syngress.
-
\ No newline at end of file
+