diff options
author | Matt Graeber <mattgraeber@gmail.com> | 2015-01-09 08:20:06 -0500 |
---|---|---|
committer | Matt Graeber <mattgraeber@gmail.com> | 2015-01-09 08:20:06 -0500 |
commit | b0cdb2b754454b18dc89c772ce0d315beab7400b (patch) | |
tree | 0bef407fe5aaf4dde964f263f6637bf77ef2a33f | |
parent | dc1a5e519fef327f694bc61d522c750fabf831aa (diff) | |
parent | 90a05de7a66c3f256dd206ec4c8ba4b70bb02016 (diff) | |
download | PowerSploit-b0cdb2b754454b18dc89c772ce0d315beab7400b.tar.gz PowerSploit-b0cdb2b754454b18dc89c772ce0d315beab7400b.zip |
Merge pull request #59 from clymb3r/master
Bugfix: Resolving ordinals in remote dll injection
-rw-r--r-- | CodeExecution/Invoke-ReflectivePEInjection.ps1 | 4 |
1 files changed, 2 insertions, 2 deletions
diff --git a/CodeExecution/Invoke-ReflectivePEInjection.ps1 b/CodeExecution/Invoke-ReflectivePEInjection.ps1 index 9f13d80..f149ed2 100644 --- a/CodeExecution/Invoke-ReflectivePEInjection.ps1 +++ b/CodeExecution/Invoke-ReflectivePEInjection.ps1 @@ -33,7 +33,7 @@ Author: Joe Bialek, Twitter: @JosephBialek License: BSD 3-Clause Required Dependencies: None Optional Dependencies: None -Version: 1.2 +Version: 1.3 .DESCRIPTION @@ -1547,7 +1547,7 @@ $RemoteScriptBlock = { { Throw "Unable to allocate memory in the remote process for shellcode" } - + [UIntPtr]$NumBytesWritten = [UIntPtr]::Zero $Success = $Win32Functions.WriteProcessMemory.Invoke($RemoteProcHandle, $RSCAddr, $SCPSMemOriginal, [UIntPtr][UInt64]$SCLength, [Ref]$NumBytesWritten) if (($Success -eq $false) -or ([UInt64]$NumBytesWritten -ne [UInt64]$SCLength)) { |