From fdb1aef6f353505749a9afd74f4917b1674d441d Mon Sep 17 00:00:00 2001
From: Yacine Boulbot <35232505+yacinebbt@users.noreply.github.com>
Date: Wed, 11 Dec 2024 16:45:15 +0100
Subject: [PATCH] fix etc path
https://documentation.wazuh.com/current/proof-of-concept-guide/audit-commands-run-by-user.html
the page containing two missing forward slashes "/"
---
source/proof-of-concept-guide/audit-commands-run-by-user.rst | 4 ++--
1 file changed, 2 insertions(+), 2 deletions(-)
diff --git a/source/proof-of-concept-guide/audit-commands-run-by-user.rst b/source/proof-of-concept-guide/audit-commands-run-by-user.rst
index 267b87afaa..56a1f69cc5 100644
--- a/source/proof-of-concept-guide/audit-commands-run-by-user.rst
+++ b/source/proof-of-concept-guide/audit-commands-run-by-user.rst
@@ -105,7 +105,7 @@ Perform the following steps to create a CDB list of malicious programs and rules
.. code-block:: xml
- etc/lists/suspicious-programs
+ /etc/lists/suspicious-programs
#. Create a high severity rule to fire when a "red" program is executed. Add this new rule to the ``/var/ossec/etc/rules/local_rules.xml`` file on the Wazuh server.
@@ -114,7 +114,7 @@ Perform the following steps to create a CDB list of malicious programs and rules
80792
- etc/lists/suspicious-programs
+ /etc/lists/suspicious-programs
Audit: Highly Suspicious Command executed: $(audit.exe)
audit_command,