From d4c8d7aeafd5294e23ff664c2019ba472e174b2e Mon Sep 17 00:00:00 2001 From: Rene Pietzsch Date: Tue, 12 Sep 2023 16:58:47 +0200 Subject: [PATCH] fix prev/next links fix link target to open in _blank --- .../define-the-interfaces/index.md | 2 +- docs/build/tutorial-how-to-link-ids-to-osint/index.md | 3 +++ .../lift-data-from-STIX-2.1-data-of-mitre-attack/index.md | 8 ++++---- 3 files changed, 8 insertions(+), 5 deletions(-) diff --git a/docs/build/tutorial-how-to-link-ids-to-osint/define-the-interfaces/index.md b/docs/build/tutorial-how-to-link-ids-to-osint/define-the-interfaces/index.md index ff4c34c5..2a3029c1 100644 --- a/docs/build/tutorial-how-to-link-ids-to-osint/define-the-interfaces/index.md +++ b/docs/build/tutorial-how-to-link-ids-to-osint/define-the-interfaces/index.md @@ -178,4 +178,4 @@ Tutorial: [how to link Intrusion Detection Systems (IDS) to Open-Source INTellig Next chapter: [Build a Knowledge Graph from MITRE ATT&CK® datasets](../lift-data-from-STIX-2.1-data-of-mitre-attack/index.md) -Previous chapter: [Specify the dashboards of use cases before the RDF models](../define-the-interfaces/index.md) +Previous chapter: [Define the need, the expected result and the use cases](../define-the-need/index.md) diff --git a/docs/build/tutorial-how-to-link-ids-to-osint/index.md b/docs/build/tutorial-how-to-link-ids-to-osint/index.md index 9b48f7d7..f3c56e55 100644 --- a/docs/build/tutorial-how-to-link-ids-to-osint/index.md +++ b/docs/build/tutorial-how-to-link-ids-to-osint/index.md @@ -42,3 +42,6 @@ eccenca will offer an online sandbox running an instance of Corporate Memory. You can also install Corporate Memory Control ([cmemc](https://eccenca.com/go/cmemc)) on your computer to test the example of bash scripts in this tutorial. For the part "Link IDS event to a knowledge graph in dashboards", you need to have a Splunk instance where you can install the Splunk apps of this tutorial. +--- + +Next chapter: [Define the need, the expected result and the use cases](./define-the-need/index.md) diff --git a/docs/build/tutorial-how-to-link-ids-to-osint/lift-data-from-STIX-2.1-data-of-mitre-attack/index.md b/docs/build/tutorial-how-to-link-ids-to-osint/lift-data-from-STIX-2.1-data-of-mitre-attack/index.md index 97d2960e..f5b3e65d 100644 --- a/docs/build/tutorial-how-to-link-ids-to-osint/lift-data-from-STIX-2.1-data-of-mitre-attack/index.md +++ b/docs/build/tutorial-how-to-link-ids-to-osint/lift-data-from-STIX-2.1-data-of-mitre-attack/index.md @@ -6,9 +6,9 @@ MITRE ATT&CK is a globally-accessible knowledge base of adversary tactics and te The MITRE ATT&CK datasets in STIX 2.1 JSON collections are here: -* [enterprise-attack.json](https://github.com/mitre-attack/attack-stix-data/tree/master/enterprise-attack/enterprise-attack.json) -* [mobile-attack.json](https://github.com/mitre-attack/attack-stix-data/blob/master/mobile-attack/mobile-attack.json) -* [ics-attack.json](https://github.com/mitre-attack/attack-stix-data/blob/master/ics-attack/ics-attack.json) +* [enterprise-attack.json](https://github.com/mitre-attack/attack-stix-data/tree/master/enterprise-attack/enterprise-attack.json){target=_blank} +* [mobile-attack.json](https://github.com/mitre-attack/attack-stix-data/blob/master/mobile-attack/mobile-attack.json){target=_blank} +* [ics-attack.json](https://github.com/mitre-attack/attack-stix-data/blob/master/ics-attack/ics-attack.json){target=_blank} [Structured Threat Information Expression (STIX™)]( https://oasis-open.github.io/cti-documentation/stix/intro.html) is a language and serialization format used to exchange cyber threat intelligence (CTI). @@ -326,7 +326,7 @@ ctia:Reference object has these properties: !!! Tip Sometimes, several urls are not correct. You can use the component "Fix URI" to fix the classic problems. - + ![](23-2-fix-url.png) !!! Warning