Docs: Removed redundant word

This commit is contained in:
ybasford 2022-08-29 12:17:33 +03:00 committed by Mike Salvatore
parent c98a55bcd4
commit 99cd35aae5
1 changed files with 1 additions and 2 deletions

View File

@ -22,8 +22,7 @@ The PowerShell exploiter can be run from both Linux and Windows attackers. On
Windows attackers, the exploiter has the ability to use the cached username Windows attackers, the exploiter has the ability to use the cached username
and/or password from the current user. On both Linux and Windows attackers, the and/or password from the current user. On both Linux and Windows attackers, the
exploiter uses all combinations of the [user-configured usernames and exploiter uses all combinations of the [user-configured usernames and
passwords]({{< ref "/usage/configuration/basic-credentials" >}}), as well as passwords]({{< ref "/usage/configuration/basic-credentials" >}}), as well as LM or NT hashes that have been collected. Different combinations of
and LM or NT hashes that have been collected. Different combinations of
credentials are attempted in the following order: credentials are attempted in the following order:
1. **Cached username and password (Windows attacker only)** - The exploiter will 1. **Cached username and password (Windows attacker only)** - The exploiter will