Skip to content

Commit

Permalink
Docs: Improve wording of WMI exploiter explanation
Browse files Browse the repository at this point in the history
  • Loading branch information
mssalvatore committed Oct 25, 2024
1 parent 6a2ed6c commit 9d6a9fb
Showing 1 changed file with 5 additions and 3 deletions.
8 changes: 5 additions & 3 deletions docs/content/features/exploiters/wmi.md
Original file line number Diff line number Diff line change
Expand Up @@ -18,9 +18,11 @@ functions, managing network resources, etc.

## Exploitation

Machines with WMI enabled may be accessible to attackers if they come across the
correct credentials. Infection Monkey's WMI exploiter uses brute-force to
attempt to propagate to a victim via WMI.
Attackers that can successfully authenticate to a machine via WMI can run
arbitrary commands on the victim machine. This allows the attacker to perform
actions such as installing malware, exfiltrating data, or pivoting and moving
laterally through the network. Infection Monkey's WMI exploiter uses
brute-force to attempt to propagate to a victim via WMI.

![WMI Configuration](
/images/island/configuration-page/wmi-exploiter-configuration.png
Expand Down

0 comments on commit 9d6a9fb

Please sign in to comment.