From 4475824be068180c252194629d8c22db594a79d5 Mon Sep 17 00:00:00 2001 From: bitform Date: Sun, 17 Feb 2013 18:12:56 -0500 Subject: Updated 64-32bit conversion logic for Metasploit --- CodeExecution/Invoke-Shellcode.ps1 | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) (limited to 'CodeExecution/Invoke-Shellcode.ps1') diff --git a/CodeExecution/Invoke-Shellcode.ps1 b/CodeExecution/Invoke-Shellcode.ps1 index 4f59f3b..563d3a7 100644 --- a/CodeExecution/Invoke-Shellcode.ps1 +++ b/CodeExecution/Invoke-Shellcode.ps1 @@ -528,8 +528,8 @@ http://www.exploit-monday.com # The currently supported Metasploit payloads are 32-bit. This block of code implements the logic to execute this script from 32-bit PowerShell # Get this script's contents and pass it to 32-bit powershell with the same parameters passed to this function - # Pull out just the content of the this script's invocation. This is only accessible via a private field of the InvocationInfo object instance - $RootInvocation = $MyInvocation.GetType().GetField('_scriptPosition', 'NonPublic, Instance').GetValue($MyInvocation).Text + # Pull out just the content of the this script's invocation. + $RootInvocation = $MyInvocation.Line $Response = $True -- cgit v1.2.3