diff options
author | Harmj0y <will@harmj0y.net> | 2016-06-04 19:07:28 -0400 |
---|---|---|
committer | Harmj0y <will@harmj0y.net> | 2016-06-04 19:07:28 -0400 |
commit | 491594529205b66937c718b38cb4e7909935e6ec (patch) | |
tree | cae8b0d0f7703c1cf3bfd8b6548225f9206c64e4 /Privesc/README.md | |
parent | 1b359e7875de1e8392224af8591d062fff89a525 (diff) | |
download | PowerSploit-491594529205b66937c718b38cb4e7909935e6ec.tar.gz PowerSploit-491594529205b66937c718b38cb4e7909935e6ec.zip |
Renamed Get-RegistryAutoRun to Get-ModifiableRegistryAutoRun
Renamed Find-PathHijack to Find-PathDLLHijack
Fixed exposed functions in PowerSploit.psd1
Diffstat (limited to 'Privesc/README.md')
-rw-r--r-- | Privesc/README.md | 6 |
1 files changed, 3 insertions, 3 deletions
diff --git a/Privesc/README.md b/Privesc/README.md index 8e4b75d..7f57768 100644 --- a/Privesc/README.md +++ b/Privesc/README.md @@ -41,13 +41,13 @@ Optional Dependencies: None ### DLL Hijacking: Find-ProcessDLLHijack - finds potential DLL hijacking opportunities for currently running processes - Find-PathHijack - finds service %PATH% .dll hijacking opportunities - Write-HijackDll - writes out a hijackable .dll + Find-PathDLLHijack - finds service %PATH% DLL hijacking opportunities + Write-HijackDll - writes out a hijackable DLL ### Registry Checks: Get-RegistryAlwaysInstallElevated - checks if the AlwaysInstallElevated registry key is set Get-RegistryAutoLogon - checks for Autologon credentials in the registry - Get-RegistryAutoRun - checks for any modifiable binaries/scripts (or their configs) in HKLM autoruns + Get-ModifiableRegistryAutoRun - checks for any modifiable binaries/scripts (or their configs) in HKLM autoruns ### Miscellaneous Checks: Get-ModifiableScheduledTaskFile - find schtasks with modifiable target files |