diff --git a/anti-behavioral-analysis/detect-debugger.md b/anti-behavioral-analysis/detect-debugger.md index e4f3c139..01ecd4ba 100644 --- a/anti-behavioral-analysis/detect-debugger.md +++ b/anti-behavioral-analysis/detect-debugger.md @@ -53,9 +53,9 @@ Malware Examples References ---------- -[1] Alexander Antukh, "Anti-debugging Techniques Cheat Sheet," 19 January 2015. http://antukh.com/blog/2015/01/19/malware-techniques-cheat-sheet/. +[1] Alexander Antukh, "Anti-debugging Techniques Cheat Sheet," 19 January 2015. http://antukh.com/blog/2015/01/19/malware-techniques-cheat-sheet. -[2] Joshua Cannell, Malwarebytes Labs, "Five Anti-Analysis Tricks that sometimes Fool Analysts," 31 March 2016. https://blog.malwarebytes.com/threat-analysis/2014/09/five-anti-debugging-tricks-that-sometimes-fool-analysts/. +[2] Joshua Cannell, Malwarebytes Labs, "Five Anti-Analysis Tricks that sometimes Fool Analysts," 31 March 2016. https://blog.malwarebytes.com/threat-analysis/2014/09/five-anti-debugging-tricks-that-sometimes-fool-analysts. [3] Peter Ferrie, "The 'Ultimate' Anti-Debugging Reference," 4 May 2011. https://anti-reversing.com/Downloads/Anti-Reversing/The_Ultimate_Anti-Reversing_Reference.pdf. diff --git a/command-and-control/common-port.md b/command-and-control/common-port.md index 9adc5958..f51ea136 100644 --- a/command-and-control/common-port.md +++ b/command-and-control/common-port.md @@ -2,7 +2,7 @@ |---------|------------------------| |**ID**|**T1043**| |**Objective(s)**|[Command and Control](https://github.com/MBCProject/mbc-markdown/tree/master/command-and-control)| -|**Related ATT&CK Technique**|[Commonly Used Port](https://attack.mitre.org/techniques/T1043/), [Commonly Used Port (Mobile)](https://attack.mitre.org/techniques/T1436/)| +|**Related ATT&CK Technique**|[Commonly Used Port](https://attack.mitre.org/techniques/T1043/), [Commonly Used Port - Mobile](https://attack.mitre.org/techniques/T1436/)| Commonly Used Port ================== diff --git a/impact/encrypt-impact.md b/impact/encrypt-impact.md index 937e53a5..6dd01800 100644 --- a/impact/encrypt-impact.md +++ b/impact/encrypt-impact.md @@ -2,7 +2,7 @@ |---------|------------------------| |**ID**|**E1486**| |**Objective(s)**|[Impact](https://github.com/MBCProject/mbc-markdown/tree/master/impact)| -|**Related ATT&CK Technique**|[Data Encrypted for Impact](https://attack.mitre.org/techniques/T1486/), [Encrypt Files (Mobile)](https://attack.mitre.org/techniques/T1471/)| +|**Related ATT&CK Technique**|[Data Encrypted for Impact](https://attack.mitre.org/techniques/T1486/), [Encrypt Files - Mobile](https://attack.mitre.org/techniques/T1471/)| Data Encrypted for Impact @@ -25,4 +25,4 @@ References [2] http://www.secureworks.com/cyber-threat-intelligence/threats/cryptolocker-ransomware/ - \ No newline at end of file +