diff options
author | b33f <ru.boonen@gmail.com> | 2017-07-17 21:32:22 +0100 |
---|---|---|
committer | GitHub <noreply@github.com> | 2017-07-17 21:32:22 +0100 |
commit | e47c52a090b6b590e6632eecf705bf566f3c74af (patch) | |
tree | f88f0aaf236c258b3e52a54a600ee1b77ea299ea | |
parent | b895866c3b5d6a879180ae3db3019de5c258e050 (diff) | |
download | PowerSploit-e47c52a090b6b590e6632eecf705bf566f3c74af.tar.gz PowerSploit-e47c52a090b6b590e6632eecf705bf566f3c74af.zip |
+ PSv2 Compatibility
Fix for unable to index into object of type System.Diagnostic.Process on PSv2.
-rw-r--r-- | Exfiltration/Invoke-CredentialInjection.ps1 | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/Exfiltration/Invoke-CredentialInjection.ps1 b/Exfiltration/Invoke-CredentialInjection.ps1 index 818e551..b025328 100644 --- a/Exfiltration/Invoke-CredentialInjection.ps1 +++ b/Exfiltration/Invoke-CredentialInjection.ps1 @@ -3346,7 +3346,7 @@ function Invoke-CredentialInjection } elseif ($PsCmdlet.ParameterSetName -ieq "ExistingWinLogon") { - $WinLogonProcessId = (Get-Process -Name "winlogon")[0].Id + $WinLogonProcessId = (Get-Process -Name "winlogon"| Select-Object -first 1).Id } #Get a ushort representing the logontype |