forked from p34709852/monkey
Docs: Removed redundant word
This commit is contained in:
parent
c98a55bcd4
commit
99cd35aae5
|
@ -22,8 +22,7 @@ The PowerShell exploiter can be run from both Linux and Windows attackers. On
|
||||||
Windows attackers, the exploiter has the ability to use the cached username
|
Windows attackers, the exploiter has the ability to use the cached username
|
||||||
and/or password from the current user. On both Linux and Windows attackers, the
|
and/or password from the current user. On both Linux and Windows attackers, the
|
||||||
exploiter uses all combinations of the [user-configured usernames and
|
exploiter uses all combinations of the [user-configured usernames and
|
||||||
passwords]({{< ref "/usage/configuration/basic-credentials" >}}), as well as
|
passwords]({{< ref "/usage/configuration/basic-credentials" >}}), as well as LM or NT hashes that have been collected. Different combinations of
|
||||||
and LM or NT hashes that have been collected. Different combinations of
|
|
||||||
credentials are attempted in the following order:
|
credentials are attempted in the following order:
|
||||||
|
|
||||||
1. **Cached username and password (Windows attacker only)** - The exploiter will
|
1. **Cached username and password (Windows attacker only)** - The exploiter will
|
||||||
|
|
Loading…
Reference in New Issue