From 59ff1a8b1eb3a8fba4dd9dee036a6c957f8f41ef Mon Sep 17 00:00:00 2001 From: bitform Date: Sat, 19 Jan 2013 20:46:49 -0500 Subject: PETools module doc. consistency improvements * Slight consistency modifications were made to documentation. * Added module manifest for PETools --- PETools/Get-DllLoadPath.ps1 | 67 +++++++++++++++++++++++---------------------- 1 file changed, 34 insertions(+), 33 deletions(-) (limited to 'PETools/Get-DllLoadPath.ps1') diff --git a/PETools/Get-DllLoadPath.ps1 b/PETools/Get-DllLoadPath.ps1 index 687f9e9..360c913 100644 --- a/PETools/Get-DllLoadPath.ps1 +++ b/PETools/Get-DllLoadPath.ps1 @@ -1,52 +1,53 @@ function Get-DllLoadPath { <# -.Synopsis +.SYNOPSIS - PowerSploit Module - Get-DllLoadPath - Author: Matthew Graeber (@mattifestation) - License: BSD 3-Clause +PowerSploit Module - Get-DllLoadPath +Author: Matthew Graeber (@mattifestation) +License: BSD 3-Clause +Required Dependencies: None +Optional Dependencies: None -.Description +.DESCRIPTION - Get-DllLoadPath returns the path from which Windows will load a Dll for the given executable. - -.Parameter ExecutablePath +Get-DllLoadPath returns the path from which Windows will load a Dll for the given executable. + +.PARAMETER ExecutablePath Path to the executable from which the Dll would be loaded. -.Parameter DllName +.PARAMETER DllName - Name of the Dll in the form 'dllname.dll'. - -.Example +Name of the Dll in the form 'dllname.dll'. - PS> Get-DllLoadPath C:\Windows\System32\cmd.exe kernel32.dll - - Path - ---- - C:\Windows\system32\kernel32.dll - -.Example +.EXAMPLE - PS> Get-DllLoadPath C:\Windows\SysWOW64\calc.exe Comctl32.dll - - Path - ---- - C:\Windows\SysWOW64\Comctl32.dll +C:\PS> Get-DllLoadPath C:\Windows\System32\cmd.exe kernel32.dll -.Outputs +Path +---- +C:\Windows\system32\kernel32.dll - None or System.Management.Automation.PathInfo - -.Notes +.EXAMPLE + +C:\PS> Get-DllLoadPath C:\Windows\SysWOW64\calc.exe Comctl32.dll + +Path +---- +C:\Windows\SysWOW64\Comctl32.dll + +.OUTPUTS + +$null, System.Management.Automation.PathInfo + +.NOTES - This script will not detect if the executable provided intentionally alters the Dll search path via - LoadLibraryEx, SetDllDirectory, or AddDllDirectory. +This script will not detect if the executable provided intentionally alters the Dll search path via LoadLibraryEx, SetDllDirectory, or AddDllDirectory. -.Link +.LINK - My blog: http://www.exploit-monday.com - Dll Search Order Reference: http://msdn.microsoft.com/en-us/library/windows/desktop/ms682586%28v=vs.85%29.aspx +http://www.exploit-monday.com +http://msdn.microsoft.com/en-us/library/windows/desktop/ms682586%28v=vs.85%29.aspx #> Param ( -- cgit v1.2.3