diff --git a/docs/content/features/exploiters/wmi.md b/docs/content/features/exploiters/wmi.md index 31d8102b052..483b25f3e91 100644 --- a/docs/content/features/exploiters/wmi.md +++ b/docs/content/features/exploiters/wmi.md @@ -28,7 +28,7 @@ attempt to propagate to a victim via WMI. ### Credentials used -The WMI exploiter will use [user-configured credentials]( +The WMI exploiter uses [user-configured credentials]( /usage/configuration/credentials) as well as credentials collected from other victims for brute-forcing. All possible combinations of usernames, passwords, LM hashes, and NT hashes are used, prioritizing pairs provided by the user in