From 03e23778dd40f9426b89e32952eaf2c7652f5a97 Mon Sep 17 00:00:00 2001 From: vakaris_zilius Date: Wed, 13 Apr 2022 08:06:37 +0000 Subject: [PATCH] BB: Add explanation to how 46 powershell machine can be exploited --- envs/monkey_zoo/docs/fullDocs.md | 4 +++- 1 file changed, 3 insertions(+), 1 deletion(-) diff --git a/envs/monkey_zoo/docs/fullDocs.md b/envs/monkey_zoo/docs/fullDocs.md index 9d5635255..8499e1bb2 100644 --- a/envs/monkey_zoo/docs/fullDocs.md +++ b/envs/monkey_zoo/docs/fullDocs.md @@ -771,7 +771,9 @@ Accessibale through Island using m0nk3y-user. Notes: User: m0nk3y, Password: Passw0rd!
-Accessiable through cached credentials (Windows Island) +Accessible using the same m0nk3y user from island, in other words powershell exploiter can exploit +this machine without credentials as long as the user running the agent is the same on both +machines