From 1980f403ee78234eae4d93b50890d02f827a099f Mon Sep 17 00:00:00 2001 From: HarmJ0y Date: Wed, 14 Dec 2016 17:50:37 -0500 Subject: For ./CodeExecution/ : -PSScriptAnalyzering -Tweaking of synopsis blocks in order to support platyPS -Code standardization -Generated docs --- docs/CodeExecution/Invoke-DllInjection.md | 79 +++++++++++++++++++++++++++++++ 1 file changed, 79 insertions(+) create mode 100755 docs/CodeExecution/Invoke-DllInjection.md (limited to 'docs/CodeExecution/Invoke-DllInjection.md') diff --git a/docs/CodeExecution/Invoke-DllInjection.md b/docs/CodeExecution/Invoke-DllInjection.md new file mode 100755 index 0000000..d41bf31 --- /dev/null +++ b/docs/CodeExecution/Invoke-DllInjection.md @@ -0,0 +1,79 @@ +# Invoke-DllInjection + +## SYNOPSIS +Injects a Dll into the process ID of your choosing. + +PowerSploit Function: Invoke-DllInjection +Author: Matthew Graeber (@mattifestation) +License: BSD 3-Clause +Required Dependencies: None +Optional Dependencies: None + +## SYNTAX + +``` +Invoke-DllInjection [-ProcessID] [-Dll] +``` + +## DESCRIPTION +Invoke-DllInjection injects a Dll into an arbitrary process. +It does this by using VirtualAllocEx to allocate memory the size of the +DLL in the remote process, writing the names of the DLL to load into the +remote process spacing using WriteProcessMemory, and then using RtlCreateUserThread +to invoke LoadLibraryA in the context of the remote process. + +## EXAMPLES + +### -------------------------- EXAMPLE 1 -------------------------- +``` +Invoke-DllInjection -ProcessID 4274 -Dll evil.dll +``` + +Description +----------- +Inject 'evil.dll' into process ID 4274. + +## PARAMETERS + +### -ProcessID +Process ID of the process you want to inject a Dll into. + +```yaml +Type: Int32 +Parameter Sets: (All) +Aliases: + +Required: True +Position: 1 +Default value: 0 +Accept pipeline input: False +Accept wildcard characters: False +``` + +### -Dll +Name of the dll to inject. +This can be an absolute or relative path. + +```yaml +Type: String +Parameter Sets: (All) +Aliases: + +Required: True +Position: 2 +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + +## INPUTS + +## OUTPUTS + +## NOTES +Use the '-Verbose' option to print detailed information. + +## RELATED LINKS + +[http://www.exploit-monday.com](http://www.exploit-monday.com) + -- cgit v1.2.3