aboutsummaryrefslogtreecommitdiff
path: root/Recon/Get-ComputerDetails.ps1
diff options
context:
space:
mode:
authorclymb3r <bialek.joseph@gmail.com>2014-02-12 13:52:41 -0800
committerclymb3r <bialek.joseph@gmail.com>2014-02-12 13:52:41 -0800
commitb684da050ad6a9b91ae1afc6caaf3faf54c38f72 (patch)
tree35f16b278fb424575fe845f935335a3e4f06fdf1 /Recon/Get-ComputerDetails.ps1
parentbb41ab98ca19ab0ed661b5e403d5f603b08dcacb (diff)
downloadPowerSploit-b684da050ad6a9b91ae1afc6caaf3faf54c38f72.tar.gz
PowerSploit-b684da050ad6a9b91ae1afc6caaf3faf54c38f72.zip
Inject-LogonCredentials has been renamed to Invoke-CredentialInjection.
Added a check to ensure the script isn't being run from Session0 with the "NewWinLogon" flag. This flag does not work in Session0 because winlogon.exe tries to load stuff from user32.dll which requires a desktop is present. This is not possible in Session0 because there is no desktop/GUI, so it causes winlogon to load and then immediately close with error code c0000142 indicating a DLL failed to initialize. There is no way to fix this that I know of, if you need to run the script from Session0 use the "ExistingWinLogon" flag.
Diffstat (limited to 'Recon/Get-ComputerDetails.ps1')
0 files changed, 0 insertions, 0 deletions