aboutsummaryrefslogtreecommitdiff
path: root/Privesc/README.md
diff options
context:
space:
mode:
authorHarmj0y <will@harmj0y.net>2016-06-04 19:07:28 -0400
committerHarmj0y <will@harmj0y.net>2016-06-04 19:07:28 -0400
commit491594529205b66937c718b38cb4e7909935e6ec (patch)
treecae8b0d0f7703c1cf3bfd8b6548225f9206c64e4 /Privesc/README.md
parent1b359e7875de1e8392224af8591d062fff89a525 (diff)
downloadPowerSploit-491594529205b66937c718b38cb4e7909935e6ec.tar.gz
PowerSploit-491594529205b66937c718b38cb4e7909935e6ec.zip
Renamed Get-RegistryAutoRun to Get-ModifiableRegistryAutoRun
Renamed Find-PathHijack to Find-PathDLLHijack Fixed exposed functions in PowerSploit.psd1
Diffstat (limited to 'Privesc/README.md')
-rw-r--r--Privesc/README.md6
1 files changed, 3 insertions, 3 deletions
diff --git a/Privesc/README.md b/Privesc/README.md
index 8e4b75d..7f57768 100644
--- a/Privesc/README.md
+++ b/Privesc/README.md
@@ -41,13 +41,13 @@ Optional Dependencies: None
### DLL Hijacking:
Find-ProcessDLLHijack - finds potential DLL hijacking opportunities for currently running processes
- Find-PathHijack - finds service %PATH% .dll hijacking opportunities
- Write-HijackDll - writes out a hijackable .dll
+ Find-PathDLLHijack - finds service %PATH% DLL hijacking opportunities
+ Write-HijackDll - writes out a hijackable DLL
### Registry Checks:
Get-RegistryAlwaysInstallElevated - checks if the AlwaysInstallElevated registry key is set
Get-RegistryAutoLogon - checks for Autologon credentials in the registry
- Get-RegistryAutoRun - checks for any modifiable binaries/scripts (or their configs) in HKLM autoruns
+ Get-ModifiableRegistryAutoRun - checks for any modifiable binaries/scripts (or their configs) in HKLM autoruns
### Miscellaneous Checks:
Get-ModifiableScheduledTaskFile - find schtasks with modifiable target files