From 3947a5bf03a9072a8f1fc551b87a95665aafda68 Mon Sep 17 00:00:00 2001 From: r3dsquirr3l Date: Tue, 16 Oct 2018 04:48:18 +0100 Subject: [PATCH] formatting update, removed empty Source 2 (#19114) closed off
  • tag from Source 1 --- client/src/guide/english/security/scanning/index.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/client/src/guide/english/security/scanning/index.md b/client/src/guide/english/security/scanning/index.md index 786dba296d..e84b1bc010 100644 --- a/client/src/guide/english/security/scanning/index.md +++ b/client/src/guide/english/security/scanning/index.md @@ -81,6 +81,6 @@ There are many tools available to scan but one of the most common is `nmap`. It' ## Sources
      -
    1. Summarizing The Five Phases of Penetration Testing. (2015, May 06). Retrieved October 26, 2017, from https://www.cybrary.it/2015/05/summarizing-the-five-phases-of-penetration-testing/
    2. +
    3. Summarizing The Five Phases of Penetration Testing. (2015, May 06). Retrieved October 26, 2017, from https://www.cybrary.it/2015/05/summarizing-the-five-phases-of-penetration-testing/
    4. Engebretson, P. (2013). The Basics of Hacking and Penetration Testing: Ethical Hacking and Penetration Testing Made Easy Ed. 2. Syngress.
    5. -
    \ No newline at end of file +