Age | Commit message (Collapse) | Author | Files | Lines |
|
- Changed Remove-VSC to have a single mandatory parameter (DevicePath)
- Updated New-VSC to check initial state of the VSS Service and return
VSS to its inital state after execution
|
|
|
|
The column headings in the log file are out of order, e.g.
```
"TypedKey","Time","WindowTitle"
"Document1 - Word","[Shift]","01-05-2015:20:53:29:28"
"Document1 - Word","[Shift][Shift]","01-05-2015:20:53:29:31"
"Document1 - Word","[Shift]","01-05-2015:20:53:29:38"
```
The "WindowTitle" should be the first column heading like this,
```
"WindowTitle","TypedKey","Time"
"Document1 - Word","[Shift]","01-05-2015:20:53:29:28"
"Document1 - Word","[Shift][Shift]","01-05-2015:20:53:29:31"
"Document1 - Word","[Shift]","01-05-2015:20:53:29:38"
```
|
|
Updated to the latest Mimikatz build. Added sanity checks to ensure that
32bit PowerShell isn't being run on a 64bit OS which will cause Mimikatz
to fail.
|
|
Added -PassThru to Invoke-TokenManipulation
|
|
Thanks to Run Mariboe for the contribution to Invoke-TokenManipulation
adding the -PassThru flag for newly created processes. Version increased
to 1.11.
|
|
|
|
Package SIDs are now displayed for Win8 apps. Both the package SID and
secret key are requirements for authenticating to Win8 app servers.
|
|
Displays Windows vault credential objects including cleartext web
credentials.
|
|
The latest version of Mimikatz fixes a crash that happens on Windows7/8
(and server versions) after installing the latest Windows updates.
|
|
Latest version of Mimikatz now natively supports being reflectively
loaded by Invoke-ReflectivePEInjection, updating the script to take
advantage of this new version.
|
|
Conflicts:
Recon/Get-ComputerDetails.ps1
Recon/Recon.psd1
|
|
|
|
Added printers.xml and drives.xml to the search.
|
|
This bug fix was from @jakxx
|
|
Removed unnecessary comment, merged update with printers.xml and drives.xml from @jackxx
|
|
|
|
|
|
|
|
Used Select-XML to ensure compatibility with v2
|
|
Iterate version.
|
|
|
|
Bug fix of variables.
|
|
Thanks @obscuresec!
|
|
Inject-LogonCredentials has been renamed to Invoke-CredentialInjection.
|
|
Added a check to ensure the script isn't being run from Session0 with
the "NewWinLogon" flag. This flag does not work in Session0 because
winlogon.exe tries to load stuff from user32.dll which requires a
desktop is present. This is not possible in Session0 because there is no
desktop/GUI, so it causes winlogon to load and then immediately close
with error code c0000142 indicating a DLL failed to initialize. There is
no way to fix this that I know of, if you need to run the script from
Session0 use the "ExistingWinLogon" flag.
|
|
This doesn't need to reside in PowerSploit. Those that are truly
paranoid should validate that the embedded executable in
Invoke-Mimikatz.ps1 is indeed mimikatz.
This was causing AV to flag upon downloading PowerSploit.
|
|
Bug fixes for Invoke-TokenManipulation
|
|
Processes could not be started when the script was being run from
Session 0. The fix is to use the CreateProcessAsUserW function when
running in Session 0. This API requires SeAssignPrimaryTokenPrivilege
priviege, so for non-session0 calls I still use CreateProcessWithTokenW
which does not require special privileges.
|
|
|
|
Adding Inject-LogonCredentials
|
|
|
|
|
|
|
|
|
|
Scripts now work in 2008r2. I thought I tested before uploading but
something broke somehow... Now the scripts work in 2008r2 and win8+
|
|
|
|
|
|
Out-Minidump now outputs a FileInfo object (i.e. the same output as
Get-ChildItem) upon successfully creating a dump file.
|
|
|
|
Sometimes you will have a denied access to a directory.
"ErrorAction SilentlyContinue" will continue searching recursively in \SYSVOL even when it encounters a directory where access is denied.
|
|
Fix error handling and various style problems
|
|
|
|
Added checks to ensure that the script is being ran on a domain-joined machine and with a domain account.
|
|
|
|
Get-Keystrokes is a PowerShell keylogger
|
|
|
|
Out-Minidump writes a process dump file with all process memory to disk.
This is similar to running procdump.exe with the '-ma' switch.
|
|
|
|
|