BB: Add explanation to how 46 powershell machine can be exploited

This commit is contained in:
vakaris_zilius 2022-04-13 08:06:37 +00:00 committed by vakarisz
parent 4df72d08eb
commit 03e23778dd
1 changed files with 3 additions and 1 deletions

View File

@ -771,7 +771,9 @@ Accessibale through Island using m0nk3y-user.</td>
<tr class="even">
<td>Notes:</td>
<td>User: m0nk3y, Password: Passw0rd!<br>
Accessiable through cached credentials (Windows Island)</td>
Accessible using the same m0nk3y user from island, in other words powershell exploiter can exploit
this machine without credentials as long as the user running the agent is the same on both
machines</td>
</tr>
</tbody>
</table>