From 1048e12fbdf316ee8b19a45ef81ec3ae6f0e2fc8 Mon Sep 17 00:00:00 2001 From: Daniel Goldberg Date: Wed, 28 Mar 2018 15:11:34 +0300 Subject: [PATCH] Shorter and maybe final wording --- monkey_island/cc/ui/src/components/pages/ReportPage.js | 8 ++++---- 1 file changed, 4 insertions(+), 4 deletions(-) diff --git a/monkey_island/cc/ui/src/components/pages/ReportPage.js b/monkey_island/cc/ui/src/components/pages/ReportPage.js index 2a13e46dd..34cd9252e 100644 --- a/monkey_island/cc/ui/src/components/pages/ReportPage.js +++ b/monkey_island/cc/ui/src/components/pages/ReportPage.js @@ -315,9 +315,9 @@ class ReportPageComponent extends AuthComponent {
  • Machines are accessible using passwords supplied by the user during the Monkey’s configuration.
  • : null} {this.state.report.overview.issues[this.Issue.AZURE] ? -
  • Machines contained plain text passwords accessible to attackers. For more info see Azure machines expose plaintext passwords. (Harvesting Azure Passwords.
  • : null} + >More info) : null} @@ -596,9 +596,9 @@ class ReportPageComponent extends AuthComponent { generateAzureIssue(issue) { return (
  • - Azure VM Access configuration files should be deleted after use to avoid credential leakage. + Delete VM Access plugin configuration files. - VM Access plugin configuration files were left on the machine. Credentials could be stolen from {issue.machine} for the following users{issue.users}. Read more about the security issue and remediation