aboutsummaryrefslogtreecommitdiff
path: root/Exfiltration/Get-TimedScreenshot.ps1
diff options
context:
space:
mode:
authorFixTheExchange <josh.bryant@custommopar.com>2015-10-30 11:38:57 -0500
committerFixTheExchange <josh.bryant@custommopar.com>2015-10-30 11:38:57 -0500
commit17dd6835b97ee8c40e02319301e09be35770cd2f (patch)
treee990df435e395f4e9e61692fc762430bd0be8c2a /Exfiltration/Get-TimedScreenshot.ps1
parent9f78286ea7b0ec65d2aa09893a076864dd8d14e9 (diff)
downloadPowerSploit-17dd6835b97ee8c40e02319301e09be35770cd2f.tar.gz
PowerSploit-17dd6835b97ee8c40e02319301e09be35770cd2f.zip
Update Invoke-TokenManipulation.ps1
Windows 10 breaks the current version of Invoke-TokenManipulation.ps1 because wininit is now a protected processes. Rather than hardcoding to a specific process to obtain a SYSTEM token, it's better to enumerate all processes running as SYSTEM and find one that works. I have updated the script to version 1.12 and added logic on lines 1689-1696 to make sure it can successfully grab a SYSTEM token necessary to function.
Diffstat (limited to 'Exfiltration/Get-TimedScreenshot.ps1')
0 files changed, 0 insertions, 0 deletions