diff --git a/monkey/monkey_island/cc/services/config_schema/definitions/exploiter_classes.py b/monkey/monkey_island/cc/services/config_schema/definitions/exploiter_classes.py index ecc9b0029..fc1342eb4 100644 --- a/monkey/monkey_island/cc/services/config_schema/definitions/exploiter_classes.py +++ b/monkey/monkey_island/cc/services/config_schema/definitions/exploiter_classes.py @@ -160,7 +160,10 @@ EXPLOITER_CLASSES = { "server domain controller by using the Netlogon Remote Protocol (MS-NRPC). " "This exploiter changes the password of a Windows server domain controller " "account and could prevent the victim domain controller from communicating " - "with other domain controllers.", + "with other domain controllers. While it attempts to undo " + "its changes and reset the password back to the original after the " + "vulnerability is exploited, this is not successful in all cases. For " + "instructions on how to reset the domain controller's password, see the documentation.", "link": "https://www.guardicore.com/infectionmonkey/docs/reference/exploiters/zerologon/" } ]