diff --git a/client/src/guide/english/security/scanning/index.md b/client/src/guide/english/security/scanning/index.md index 786dba296d..e84b1bc010 100644 --- a/client/src/guide/english/security/scanning/index.md +++ b/client/src/guide/english/security/scanning/index.md @@ -81,6 +81,6 @@ There are many tools available to scan but one of the most common is `nmap`. It' ## Sources
    -
  1. Summarizing The Five Phases of Penetration Testing. (2015, May 06). Retrieved October 26, 2017, from https://www.cybrary.it/2015/05/summarizing-the-five-phases-of-penetration-testing/
  2. +
  3. Summarizing The Five Phases of Penetration Testing. (2015, May 06). Retrieved October 26, 2017, from https://www.cybrary.it/2015/05/summarizing-the-five-phases-of-penetration-testing/
  4. Engebretson, P. (2013). The Basics of Hacking and Penetration Testing: Ethical Hacking and Penetration Testing Made Easy Ed. 2. Syngress.
  5. -
\ No newline at end of file +