diff --git a/pentesting-cloud/azure-security/az-lateral-movement-cloud-on-prem/pass-the-prt.md b/pentesting-cloud/azure-security/az-lateral-movement-cloud-on-prem/pass-the-prt.md
index a60046bfb0..f66138c7aa 100644
--- a/pentesting-cloud/azure-security/az-lateral-movement-cloud-on-prem/pass-the-prt.md
+++ b/pentesting-cloud/azure-security/az-lateral-movement-cloud-on-prem/pass-the-prt.md
@@ -58,7 +58,7 @@ The **LSASS** process will send to the TPM the **KDF context**, and the TPM will
The **KDF context is** a nonce from AzureAD and the PRT creating a **JWT** mixed with a **context** (random bytes).
-Therefore, even if the PTR cannot be extracted because it's located inside the TPM, it's possible to abuseLSASS to **request derived keys from new contexts and use the generated keys to sign Cookies**.
+Therefore, even if the PRT cannot be extracted because it's located inside the TPM, it's possible to abuseLSASS to **request derived keys from new contexts and use the generated keys to sign Cookies**.
@@ -126,7 +126,7 @@ Connect-AzureAD --AadAccessToken --AccountId
### Attack - Using roadrecon
-### Attack - Using AADInternals an leaked PTR
+### Attack - Using AADInternals and a leaked PRT
`Get-AADIntUserPRTToken` **gets user’s PRT token** from the Azure AD joined or Hybrid joined computer. Uses `BrowserCore.exe` to get the PRT token.
@@ -269,7 +269,7 @@ HttpOnly: Set to True (checked)
The rest should be the defaults. Make sure you can refresh the page and the cookie doesn’t disappear, if it does, you may have made a mistake and have to go through the process again. If it doesn’t, you should be good.
{% endhint %}
-#### Option 2 - roadrecon using PTR
+#### Option 2 - roadrecon using PRT
* Renew the PRT first, which will save it in `roadtx.prt`: