From a2418444df9963282ddb0a392d0e4ba4ea502d7f Mon Sep 17 00:00:00 2001 From: CPol Date: Tue, 28 May 2024 20:23:16 +0000 Subject: [PATCH] GITBOOK-4345: No subject --- windows-hardening/active-directory-methodology/README.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/windows-hardening/active-directory-methodology/README.md b/windows-hardening/active-directory-methodology/README.md index 90fc2a5bb..12cb986de 100644 --- a/windows-hardening/active-directory-methodology/README.md +++ b/windows-hardening/active-directory-methodology/README.md @@ -343,8 +343,8 @@ The compromised user could have some **interesting privileges over some domain o Discovering a **Spool service listening** within the domain can be **abused** to **acquire new credentials** and **escalate privileges**. -{% content-ref url="acl-persistence-abuse/" %} -[acl-persistence-abuse](acl-persistence-abuse/) +{% content-ref url="printers-spooler-service-abuse.md" %} +[printers-spooler-service-abuse.md](printers-spooler-service-abuse.md) {% endcontent-ref %} ### Third party sessions abuse