aboutsummaryrefslogtreecommitdiff
path: root/CodeExecution/Invoke-Shellcode.ps1
diff options
context:
space:
mode:
authorbitform <matt@exploit-monday.com>2013-02-17 18:12:56 -0500
committerbitform <matt@exploit-monday.com>2013-02-17 18:12:56 -0500
commit4475824be068180c252194629d8c22db594a79d5 (patch)
tree2094df01e1458d3a1a25d2a3b1015ec08d80cdea /CodeExecution/Invoke-Shellcode.ps1
parentfeca7f25133083230fed12f52ea4d7f6ab2abb74 (diff)
downloadPowerSploit-4475824be068180c252194629d8c22db594a79d5.tar.gz
PowerSploit-4475824be068180c252194629d8c22db594a79d5.zip
Updated 64-32bit conversion logic for Metasploit
Diffstat (limited to 'CodeExecution/Invoke-Shellcode.ps1')
-rw-r--r--CodeExecution/Invoke-Shellcode.ps14
1 files changed, 2 insertions, 2 deletions
diff --git a/CodeExecution/Invoke-Shellcode.ps1 b/CodeExecution/Invoke-Shellcode.ps1
index 4f59f3b..563d3a7 100644
--- a/CodeExecution/Invoke-Shellcode.ps1
+++ b/CodeExecution/Invoke-Shellcode.ps1
@@ -528,8 +528,8 @@ http://www.exploit-monday.com
# The currently supported Metasploit payloads are 32-bit. This block of code implements the logic to execute this script from 32-bit PowerShell
# Get this script's contents and pass it to 32-bit powershell with the same parameters passed to this function
- # Pull out just the content of the this script's invocation. This is only accessible via a private field of the InvocationInfo object instance
- $RootInvocation = $MyInvocation.GetType().GetField('_scriptPosition', 'NonPublic, Instance').GetValue($MyInvocation).Text
+ # Pull out just the content of the this script's invocation.
+ $RootInvocation = $MyInvocation.Line
$Response = $True