From 99cd35aae5a82c3b0b370ac6a755447e7910ab5e Mon Sep 17 00:00:00 2001 From: ybasford Date: Mon, 29 Aug 2022 12:17:33 +0300 Subject: [PATCH] Docs: Removed redundant word --- docs/content/reference/exploiters/PowerShell.md | 3 +-- 1 file changed, 1 insertion(+), 2 deletions(-) diff --git a/docs/content/reference/exploiters/PowerShell.md b/docs/content/reference/exploiters/PowerShell.md index c80943154..8924fe44e 100644 --- a/docs/content/reference/exploiters/PowerShell.md +++ b/docs/content/reference/exploiters/PowerShell.md @@ -22,8 +22,7 @@ The PowerShell exploiter can be run from both Linux and Windows attackers. On Windows attackers, the exploiter has the ability to use the cached username and/or password from the current user. On both Linux and Windows attackers, the exploiter uses all combinations of the [user-configured usernames and -passwords]({{< ref "/usage/configuration/basic-credentials" >}}), as well as -and LM or NT hashes that have been collected. Different combinations of +passwords]({{< ref "/usage/configuration/basic-credentials" >}}), as well as LM or NT hashes that have been collected. Different combinations of credentials are attempted in the following order: 1. **Cached username and password (Windows attacker only)** - The exploiter will