From 9d6a9fb192c97ed35fae07820daad5568ba81ac2 Mon Sep 17 00:00:00 2001 From: Mike Salvatore Date: Fri, 25 Oct 2024 10:04:36 -0400 Subject: [PATCH] Docs: Improve wording of WMI exploiter explanation --- docs/content/features/exploiters/wmi.md | 8 +++++--- 1 file changed, 5 insertions(+), 3 deletions(-) diff --git a/docs/content/features/exploiters/wmi.md b/docs/content/features/exploiters/wmi.md index 483b25f3e91..759507e465d 100644 --- a/docs/content/features/exploiters/wmi.md +++ b/docs/content/features/exploiters/wmi.md @@ -18,9 +18,11 @@ functions, managing network resources, etc. ## Exploitation -Machines with WMI enabled may be accessible to attackers if they come across the -correct credentials. Infection Monkey's WMI exploiter uses brute-force to -attempt to propagate to a victim via WMI. +Attackers that can successfully authenticate to a machine via WMI can run +arbitrary commands on the victim machine. This allows the attacker to perform +actions such as installing malware, exfiltrating data, or pivoting and moving +laterally through the network. Infection Monkey's WMI exploiter uses +brute-force to attempt to propagate to a victim via WMI. ![WMI Configuration]( /images/island/configuration-page/wmi-exploiter-configuration.png