diff --git a/src/pentesting-cloud/aws-security/aws-services/aws-ecr-enum.md b/src/pentesting-cloud/aws-security/aws-services/aws-ecr-enum.md
index 043c1e63e..f928c389d 100644
--- a/src/pentesting-cloud/aws-security/aws-services/aws-ecr-enum.md
+++ b/src/pentesting-cloud/aws-security/aws-services/aws-ecr-enum.md
@@ -2,13 +2,9 @@
{{#include ../../../banners/hacktricks-training.md}}
-## AWS - ECR Enum
+## ECR
-
-
-### ECR
-
-#### Basic Information
+### Basic Information
Amazon **Elastic Container Registry** (Amazon ECR) is a **managed container image registry service**. It is designed to provide an environment where customers can interact with their container images using well-known interfaces. Specifically, the use of the Docker CLI or any preferred client is supported, enabling activities such as pushing, pulling, and managing container images.
@@ -49,7 +45,7 @@ These are the **images** that in the **private registry** or to the **public** o
-#### Enumeration
+### Enumeration
```bash
# Get repos
@@ -71,13 +67,13 @@ aws ecr get-registry-policy
aws ecr get-repository-policy --repository-name
```
-#### Unauthenticated Enum
+### Unauthenticated Enum
{{#ref}}
../aws-unauthenticated-enum-access/aws-ecr-unauthenticated-enum.md
{{#endref}}
-#### Privesc
+### Privesc
In the following page you can check how to **abuse ECR permissions to escalate privileges**:
@@ -85,13 +81,13 @@ In the following page you can check how to **abuse ECR permissions to escalate p
../aws-privilege-escalation/aws-ecr-privesc.md
{{#endref}}
-#### Post Exploitation
+### Post Exploitation
{{#ref}}
../aws-post-exploitation/aws-ecr-post-exploitation.md
{{#endref}}
-#### Persistence
+### Persistence
{{#ref}}
../aws-persistence/aws-ecr-persistence.md