diff --git a/packages/javascript/bh-shared-ui/src/components/HelpTexts/CoerceAndRelayNTLMToADCS/WindowsAbuse.tsx b/packages/javascript/bh-shared-ui/src/components/HelpTexts/CoerceAndRelayNTLMToADCS/WindowsAbuse.tsx index dbd5dbaff..6117076c8 100644 --- a/packages/javascript/bh-shared-ui/src/components/HelpTexts/CoerceAndRelayNTLMToADCS/WindowsAbuse.tsx +++ b/packages/javascript/bh-shared-ui/src/components/HelpTexts/CoerceAndRelayNTLMToADCS/WindowsAbuse.tsx @@ -22,15 +22,10 @@ const WindowsAbuse: FC = () => { return ( <> - 1: Take Over the SMB Port on the Attacker Host To avoid a conflict with SMB running on the - attacker-controlled Windows computer, it is necessary to takeover the SMB port. This can be achieved - with smbtakeover. + 1: Start the Relay Server The NTLM relay can be executed with Inveigh. - 2: Start the Relay Server The NTLM relay can be executed with Inveigh. - - - 3: Coerce the Target Computer Several coercion methods are documented here:{' '} + 2: Coerce the Target Computer Several coercion methods are documented here:{' '} Windows Coerced Authentication Methods diff --git a/packages/javascript/bh-shared-ui/src/components/HelpTexts/CoerceAndRelayNTLMToLDAP/WindowsAbuse.tsx b/packages/javascript/bh-shared-ui/src/components/HelpTexts/CoerceAndRelayNTLMToLDAP/WindowsAbuse.tsx index dbd5dbaff..6117076c8 100644 --- a/packages/javascript/bh-shared-ui/src/components/HelpTexts/CoerceAndRelayNTLMToLDAP/WindowsAbuse.tsx +++ b/packages/javascript/bh-shared-ui/src/components/HelpTexts/CoerceAndRelayNTLMToLDAP/WindowsAbuse.tsx @@ -22,15 +22,10 @@ const WindowsAbuse: FC = () => { return ( <> - 1: Take Over the SMB Port on the Attacker Host To avoid a conflict with SMB running on the - attacker-controlled Windows computer, it is necessary to takeover the SMB port. This can be achieved - with smbtakeover. + 1: Start the Relay Server The NTLM relay can be executed with Inveigh. - 2: Start the Relay Server The NTLM relay can be executed with Inveigh. - - - 3: Coerce the Target Computer Several coercion methods are documented here:{' '} + 2: Coerce the Target Computer Several coercion methods are documented here:{' '} Windows Coerced Authentication Methods diff --git a/packages/javascript/bh-shared-ui/src/components/HelpTexts/CoerceAndRelayNTLMToLDAPS/WindowsAbuse.tsx b/packages/javascript/bh-shared-ui/src/components/HelpTexts/CoerceAndRelayNTLMToLDAPS/WindowsAbuse.tsx index dbd5dbaff..6117076c8 100644 --- a/packages/javascript/bh-shared-ui/src/components/HelpTexts/CoerceAndRelayNTLMToLDAPS/WindowsAbuse.tsx +++ b/packages/javascript/bh-shared-ui/src/components/HelpTexts/CoerceAndRelayNTLMToLDAPS/WindowsAbuse.tsx @@ -22,15 +22,10 @@ const WindowsAbuse: FC = () => { return ( <> - 1: Take Over the SMB Port on the Attacker Host To avoid a conflict with SMB running on the - attacker-controlled Windows computer, it is necessary to takeover the SMB port. This can be achieved - with smbtakeover. + 1: Start the Relay Server The NTLM relay can be executed with Inveigh. - 2: Start the Relay Server The NTLM relay can be executed with Inveigh. - - - 3: Coerce the Target Computer Several coercion methods are documented here:{' '} + 2: Coerce the Target Computer Several coercion methods are documented here:{' '} Windows Coerced Authentication Methods