diff options
author | clymb3r <bialek.joseph@gmail.com> | 2014-01-10 21:41:44 -0800 |
---|---|---|
committer | clymb3r <bialek.joseph@gmail.com> | 2014-01-10 21:41:44 -0800 |
commit | bb41ab98ca19ab0ed661b5e403d5f603b08dcacb (patch) | |
tree | 2d5e989ba7c0f11fc1f12676e90d72badb6f1ac4 /Exfiltration/Invoke-CredentialInjection.ps1 | |
parent | 1503375bfbf0ee7ade498ea77444a4f1db4873e4 (diff) | |
download | PowerSploit-bb41ab98ca19ab0ed661b5e403d5f603b08dcacb.tar.gz PowerSploit-bb41ab98ca19ab0ed661b5e403d5f603b08dcacb.zip |
Bug fixes for Invoke-TokenManipulation
Processes could not be started when the script was being run from
Session 0. The fix is to use the CreateProcessAsUserW function when
running in Session 0. This API requires SeAssignPrimaryTokenPrivilege
priviege, so for non-session0 calls I still use CreateProcessWithTokenW
which does not require special privileges.
Diffstat (limited to 'Exfiltration/Invoke-CredentialInjection.ps1')
0 files changed, 0 insertions, 0 deletions