diff --git a/extensions/admin_ui/media/javascript/ui/panel/WelcomeTab.js b/extensions/admin_ui/media/javascript/ui/panel/WelcomeTab.js
index aeed3986f..9d5f670ed 100644
--- a/extensions/admin_ui/media/javascript/ui/panel/WelcomeTab.js
+++ b/extensions/admin_ui/media/javascript/ui/panel/WelcomeTab.js
@@ -33,18 +33,18 @@ WelcomeTab = function() {
Hooked Browser. Command modules are able to perform any actions that can be achieved\
through Javascript: for example they may gather information about the Hooked Browser, manipulate the DOM or perform other activities such as exploiting vulnerabilities within the local network of the Hooked Browser.
\
Each command module has a traffic light icon, which is used to indicate the following:
\
-
- The command works against the target and should be invisible to the user \
-
- The command works against the target, but may be visible to the user \
-
- It is unknown if this command works against this target \
-
- Command does not work against this target
\
- XssRays: The XssRays tab allows you to check if links, forms and URI path of the page where the browser is hooked are vulnerable to XSS. \
+
The command module works against the target and should be invisible to the user\
+
The command module works against the target, but may be visible to the user\
+
The command module is yet to be verified against this target\
+
The command module does not work against this target
\
+ XssRays: The XssRays tab allows the user to check if links, forms and URI path of the page (where the browser is hooked) is vulnerable to XSS. \
Requester: The Requester tab allows you to submit arbitrary HTTP requests on behalf of the hooked browser. \
Each request sent by the Requester is recorded in the History panel. Click a history item to view the HTTP headers and HTML source of the HTTP response.
\
You can also right-click a hooked browser to open a context-menu with additional functionality:
\
\
- Tunneling Proxy: The Proxy allows you to use a hooked browser as a proxy. Simply right-click a browser from the Hooked Browsers tree to the left and select \"Use as Proxy\". \
Each request sent through the Proxy is recorded in the History panel in the Requester tab. Click a history item to view the HTTP headers and HTML source of the HTTP response.
\
- - XssRays: XssRays allows you to check if links, forms and URI path of the page where the browser is hooked are vulnerable to XSS. To customize default settings of an XssRays scan, please use the XssRays tab.
\
+ XssRays: XssRays allows the user to check if links, forms and URI path of the page (where the browser is hooked) is vulnerable to XSS. To customize default settings of an XssRays scan, please use the XssRays tab.
\
Learn More
\
To learn more about how BeEF works please review the wiki:
\