@@ -1387,6 +1387,7 @@ Outputs a custom object containing the token privilege (name/attributes) for the
1387
1387
if ($PSBoundParameters['Special']) {
1388
1388
if ($SpecialPrivileges -Contains $_.Privilege) {
1389
1389
$_ | Add-Member Noteproperty 'ProcessId' $ProcessID
1390
+ $_ | Add-Member Aliasproperty Name ProcessId
1390
1391
$_
1391
1392
}
1392
1393
}
@@ -2077,6 +2078,7 @@ https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/wind
2077
2078
$Out | Add-Member Noteproperty 'StartName' $Service.startname
2078
2079
$Out | Add-Member Noteproperty 'AbuseFunction' "Write-ServiceBinary -Name '$($Service.name)' -Path <HijackPath>"
2079
2080
$Out | Add-Member Noteproperty 'CanRestart' ([Bool]$CanRestart)
2081
+ $Out | Add-Member Aliasproperty Name ServiceName
2080
2082
$Out.PSObject.TypeNames.Insert(0, 'PowerUp.UnquotedService')
2081
2083
$Out
2082
2084
}
@@ -2136,6 +2138,7 @@ PowerUp.ModifiablePath
2136
2138
$Out | Add-Member Noteproperty 'StartName' $ServiceStartName
2137
2139
$Out | Add-Member Noteproperty 'AbuseFunction' "Install-ServiceBinary -Name '$ServiceName'"
2138
2140
$Out | Add-Member Noteproperty 'CanRestart' ([Bool]$CanRestart)
2141
+ $Out | Add-Member Aliasproperty Name ServiceName
2139
2142
$Out.PSObject.TypeNames.Insert(0, 'PowerUp.ModifiableServiceFile')
2140
2143
$Out
2141
2144
}
@@ -2183,6 +2186,7 @@ PowerUp.ModifiablePath
2183
2186
$Out | Add-Member Noteproperty 'StartName' $ServiceDetails.startname
2184
2187
$Out | Add-Member Noteproperty 'AbuseFunction' "Invoke-ServiceAbuse -Name '$($ServiceDetails.name)'"
2185
2188
$Out | Add-Member Noteproperty 'CanRestart' ([Bool]$CanRestart)
2189
+ $Out | Add-Member Aliasproperty Name ServiceName
2186
2190
$Out.PSObject.TypeNames.Insert(0, 'PowerUp.ModifiableService')
2187
2191
$Out
2188
2192
}
@@ -3146,6 +3150,7 @@ http://www.greyhathacker.net/?p=738
3146
3150
ForEach ($ModifidablePath in $ModifidablePaths) {
3147
3151
if ($Null -ne $ModifidablePath.ModifiablePath) {
3148
3152
$ModifidablePath | Add-Member Noteproperty '%PATH%' $_
3153
+ $ModifidablePath | Add-Member Aliasproperty Name '%PATH%'
3149
3154
$ModifidablePath.PSObject.TypeNames.Insert(0, 'PowerUp.HijackableDLL.Path')
3150
3155
$ModifidablePath
3151
3156
}
@@ -3576,6 +3581,7 @@ Custom PSObject containing results.
3576
3581
$Out | Add-Member Noteproperty 'Key' "$ParentPath\$Name"
3577
3582
$Out | Add-Member Noteproperty 'Path' $Path
3578
3583
$Out | Add-Member Noteproperty 'ModifiableFile' $_
3584
+ $Out | Add-Member Aliasproperty Name Key
3579
3585
$Out.PSObject.TypeNames.Insert(0, 'PowerUp.ModifiableRegistryAutoRun')
3580
3586
$Out
3581
3587
}
@@ -3648,6 +3654,7 @@ Custom PSObject containing results.
3648
3654
$Out | Add-Member Noteproperty 'TaskName' $TaskName
3649
3655
$Out | Add-Member Noteproperty 'TaskFilePath' $_
3650
3656
$Out | Add-Member Noteproperty 'TaskTrigger' $TaskTrigger
3657
+ $Out | Add-Member Aliasproperty Name TaskName
3651
3658
$Out.PSObject.TypeNames.Insert(0, 'PowerUp.ModifiableScheduledTaskFile')
3652
3659
$Out
3653
3660
}
@@ -3658,6 +3665,7 @@ Custom PSObject containing results.
3658
3665
$Out | Add-Member Noteproperty 'TaskName' $TaskName
3659
3666
$Out | Add-Member Noteproperty 'TaskFilePath' $_
3660
3667
$Out | Add-Member Noteproperty 'TaskTrigger' $TaskTrigger
3668
+ $Out | Add-Member Aliasproperty Name TaskName
3661
3669
$Out.PSObject.TypeNames.Insert(0, 'PowerUp.ModifiableScheduledTaskFile')
3662
3670
$Out
3663
3671
}
@@ -3722,6 +3730,7 @@ Custom PSObject containing results.
3722
3730
$SearchLocations | Where-Object { Test-Path $_ } | ForEach-Object {
3723
3731
$Out = New-Object PSObject
3724
3732
$Out | Add-Member Noteproperty 'UnattendPath' $_
3733
+ $Out | Add-Member Aliasproperty Name UnattendPath
3725
3734
$Out.PSObject.TypeNames.Insert(0, 'PowerUp.UnattendedInstallFile')
3726
3735
$Out
3727
3736
}
0 commit comments