aboutsummaryrefslogtreecommitdiff
path: root/Exfiltration/Invoke-CredentialInjection.ps1
diff options
context:
space:
mode:
authorclymb3r <bialek.joseph@gmail.com>2014-01-10 21:41:44 -0800
committerclymb3r <bialek.joseph@gmail.com>2014-01-10 21:41:44 -0800
commitbb41ab98ca19ab0ed661b5e403d5f603b08dcacb (patch)
tree2d5e989ba7c0f11fc1f12676e90d72badb6f1ac4 /Exfiltration/Invoke-CredentialInjection.ps1
parent1503375bfbf0ee7ade498ea77444a4f1db4873e4 (diff)
downloadPowerSploit-bb41ab98ca19ab0ed661b5e403d5f603b08dcacb.tar.gz
PowerSploit-bb41ab98ca19ab0ed661b5e403d5f603b08dcacb.zip
Bug fixes for Invoke-TokenManipulation
Processes could not be started when the script was being run from Session 0. The fix is to use the CreateProcessAsUserW function when running in Session 0. This API requires SeAssignPrimaryTokenPrivilege priviege, so for non-session0 calls I still use CreateProcessWithTokenW which does not require special privileges.
Diffstat (limited to 'Exfiltration/Invoke-CredentialInjection.ps1')
0 files changed, 0 insertions, 0 deletions