aboutsummaryrefslogtreecommitdiff
path: root/Exfiltration
diff options
context:
space:
mode:
authorb33f <ru.boonen@gmail.com>2017-07-17 21:32:22 +0100
committerGitHub <noreply@github.com>2017-07-17 21:32:22 +0100
commite47c52a090b6b590e6632eecf705bf566f3c74af (patch)
treef88f0aaf236c258b3e52a54a600ee1b77ea299ea /Exfiltration
parentb895866c3b5d6a879180ae3db3019de5c258e050 (diff)
downloadPowerSploit-e47c52a090b6b590e6632eecf705bf566f3c74af.tar.gz
PowerSploit-e47c52a090b6b590e6632eecf705bf566f3c74af.zip
+ PSv2 Compatibility
Fix for unable to index into object of type System.Diagnostic.Process on PSv2.
Diffstat (limited to 'Exfiltration')
-rw-r--r--Exfiltration/Invoke-CredentialInjection.ps12
1 files changed, 1 insertions, 1 deletions
diff --git a/Exfiltration/Invoke-CredentialInjection.ps1 b/Exfiltration/Invoke-CredentialInjection.ps1
index 818e551..b025328 100644
--- a/Exfiltration/Invoke-CredentialInjection.ps1
+++ b/Exfiltration/Invoke-CredentialInjection.ps1
@@ -3346,7 +3346,7 @@ function Invoke-CredentialInjection
}
elseif ($PsCmdlet.ParameterSetName -ieq "ExistingWinLogon")
{
- $WinLogonProcessId = (Get-Process -Name "winlogon")[0].Id
+ $WinLogonProcessId = (Get-Process -Name "winlogon"| Select-Object -first 1).Id
}
#Get a ushort representing the logontype