diff --git a/scenarios/labs/software_and_malware_analysis/8_dynamic_continued.xml b/scenarios/labs/software_and_malware_analysis/8_dynamic_continued.xml
index 07bc722ba..07430f3fd 100644
--- a/scenarios/labs/software_and_malware_analysis/8_dynamic_continued.xml
+++ b/scenarios/labs/software_and_malware_analysis/8_dynamic_continued.xml
@@ -14,7 +14,7 @@
In your home directory you will find some binaries that you need to reverse engineer in order to determine the password that the program expects. Once you have found the password, run the program and enter the password to receive the flag.
- https://cliffe.github.io/HacktivityLabSheets/labs/software_and_malware_analysis/7-dynamic-continued/
+ https://cliffe.github.io/HacktivityLabSheets/labs/software_and_malware_analysis/8-dynamic-continued/
ctf-lab
lab-sheet