diff options
author | clymb3r <bialek.joseph@gmail.com> | 2014-02-12 13:52:41 -0800 |
---|---|---|
committer | clymb3r <bialek.joseph@gmail.com> | 2014-02-12 13:52:41 -0800 |
commit | b684da050ad6a9b91ae1afc6caaf3faf54c38f72 (patch) | |
tree | 35f16b278fb424575fe845f935335a3e4f06fdf1 /Recon/Get-ComputerDetails.ps1 | |
parent | bb41ab98ca19ab0ed661b5e403d5f603b08dcacb (diff) | |
download | PowerSploit-b684da050ad6a9b91ae1afc6caaf3faf54c38f72.tar.gz PowerSploit-b684da050ad6a9b91ae1afc6caaf3faf54c38f72.zip |
Inject-LogonCredentials has been renamed to Invoke-CredentialInjection.
Added a check to ensure the script isn't being run from Session0 with
the "NewWinLogon" flag. This flag does not work in Session0 because
winlogon.exe tries to load stuff from user32.dll which requires a
desktop is present. This is not possible in Session0 because there is no
desktop/GUI, so it causes winlogon to load and then immediately close
with error code c0000142 indicating a DLL failed to initialize. There is
no way to fix this that I know of, if you need to run the script from
Session0 use the "ExistingWinLogon" flag.
Diffstat (limited to 'Recon/Get-ComputerDetails.ps1')
0 files changed, 0 insertions, 0 deletions