diff --git a/windows-hardening/active-directory-methodology/README.md b/windows-hardening/active-directory-methodology/README.md index 90fc2a5bb90..12cb986de75 100644 --- a/windows-hardening/active-directory-methodology/README.md +++ b/windows-hardening/active-directory-methodology/README.md @@ -343,8 +343,8 @@ The compromised user could have some **interesting privileges over some domain o Discovering a **Spool service listening** within the domain can be **abused** to **acquire new credentials** and **escalate privileges**. -{% content-ref url="acl-persistence-abuse/" %} -[acl-persistence-abuse](acl-persistence-abuse/) +{% content-ref url="printers-spooler-service-abuse.md" %} +[printers-spooler-service-abuse.md](printers-spooler-service-abuse.md) {% endcontent-ref %} ### Third party sessions abuse