forked from p15670423/monkey
Docs: Removed redundant word
This commit is contained in:
parent
c98a55bcd4
commit
99cd35aae5
|
@ -22,8 +22,7 @@ The PowerShell exploiter can be run from both Linux and Windows attackers. On
|
|||
Windows attackers, the exploiter has the ability to use the cached username
|
||||
and/or password from the current user. On both Linux and Windows attackers, the
|
||||
exploiter uses all combinations of the [user-configured usernames and
|
||||
passwords]({{< ref "/usage/configuration/basic-credentials" >}}), as well as
|
||||
and LM or NT hashes that have been collected. Different combinations of
|
||||
passwords]({{< ref "/usage/configuration/basic-credentials" >}}), as well as LM or NT hashes that have been collected. Different combinations of
|
||||
credentials are attempted in the following order:
|
||||
|
||||
1. **Cached username and password (Windows attacker only)** - The exploiter will
|
||||
|
|
Loading…
Reference in New Issue