Skip to content

Commit

Permalink
fix prev/next links
Browse files Browse the repository at this point in the history
fix link target to open in _blank
  • Loading branch information
rpietzsch committed Sep 12, 2023
1 parent ae8c5bb commit d4c8d7a
Show file tree
Hide file tree
Showing 3 changed files with 8 additions and 5 deletions.
Original file line number Diff line number Diff line change
Expand Up @@ -178,4 +178,4 @@ Tutorial: [how to link Intrusion Detection Systems (IDS) to Open-Source INTellig

Next chapter: [Build a Knowledge Graph from MITRE ATT&CK® datasets](../lift-data-from-STIX-2.1-data-of-mitre-attack/index.md)

Previous chapter: [Specify the dashboards of use cases before the RDF models](../define-the-interfaces/index.md)
Previous chapter: [Define the need, the expected result and the use cases](../define-the-need/index.md)
3 changes: 3 additions & 0 deletions docs/build/tutorial-how-to-link-ids-to-osint/index.md
Original file line number Diff line number Diff line change
Expand Up @@ -42,3 +42,6 @@ eccenca will offer an online sandbox running an instance of Corporate Memory.
You can also install Corporate Memory Control ([cmemc](https://eccenca.com/go/cmemc)) on your computer to test the example of bash scripts in this tutorial.
For the part "Link IDS event to a knowledge graph in dashboards", you need to have a Splunk instance where you can install the Splunk apps of this tutorial.

---

Next chapter: [Define the need, the expected result and the use cases](./define-the-need/index.md)
Original file line number Diff line number Diff line change
Expand Up @@ -6,9 +6,9 @@ MITRE ATT&CK is a globally-accessible knowledge base of adversary tactics and te

The MITRE ATT&CK datasets in STIX 2.1 JSON collections are here:

* [enterprise-attack.json](https://github.com/mitre-attack/attack-stix-data/tree/master/enterprise-attack/enterprise-attack.json)
* [mobile-attack.json](https://github.com/mitre-attack/attack-stix-data/blob/master/mobile-attack/mobile-attack.json)
* [ics-attack.json](https://github.com/mitre-attack/attack-stix-data/blob/master/ics-attack/ics-attack.json)
* [enterprise-attack.json](https://github.com/mitre-attack/attack-stix-data/tree/master/enterprise-attack/enterprise-attack.json){target=_blank}
* [mobile-attack.json](https://github.com/mitre-attack/attack-stix-data/blob/master/mobile-attack/mobile-attack.json){target=_blank}
* [ics-attack.json](https://github.com/mitre-attack/attack-stix-data/blob/master/ics-attack/ics-attack.json){target=_blank}

[Structured Threat Information Expression (STIX™)](
https://oasis-open.github.io/cti-documentation/stix/intro.html) is a language and serialization format used to exchange cyber threat intelligence (CTI).
Expand Down Expand Up @@ -326,7 +326,7 @@ ctia:Reference object has these properties:
!!! Tip

Sometimes, several urls are not correct. You can use the component "Fix URI" to fix the classic problems.

![](23-2-fix-url.png)

!!! Warning
Expand Down

0 comments on commit d4c8d7a

Please sign in to comment.