@@ -1387,6 +1387,7 @@ Outputs a custom object containing the token privilege (name/attributes) for the
13871387 if ($PSBoundParameters['Special']) {
13881388 if ($SpecialPrivileges -Contains $_.Privilege) {
13891389 $_ | Add-Member Noteproperty 'ProcessId' $ProcessID
1390+ $_ | Add-Member Aliasproperty Name ProcessId
13901391 $_
13911392 }
13921393 }
@@ -2077,6 +2078,7 @@ https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/wind
20772078 $Out | Add-Member Noteproperty 'StartName' $Service.startname
20782079 $Out | Add-Member Noteproperty 'AbuseFunction' "Write-ServiceBinary -Name '$($Service.name)' -Path <HijackPath>"
20792080 $Out | Add-Member Noteproperty 'CanRestart' ([Bool]$CanRestart)
2081+ $Out | Add-Member Aliasproperty Name ServiceName
20802082 $Out.PSObject.TypeNames.Insert(0, 'PowerUp.UnquotedService')
20812083 $Out
20822084 }
@@ -2136,6 +2138,7 @@ PowerUp.ModifiablePath
21362138 $Out | Add-Member Noteproperty 'StartName' $ServiceStartName
21372139 $Out | Add-Member Noteproperty 'AbuseFunction' "Install-ServiceBinary -Name '$ServiceName'"
21382140 $Out | Add-Member Noteproperty 'CanRestart' ([Bool]$CanRestart)
2141+ $Out | Add-Member Aliasproperty Name ServiceName
21392142 $Out.PSObject.TypeNames.Insert(0, 'PowerUp.ModifiableServiceFile')
21402143 $Out
21412144 }
@@ -2183,6 +2186,7 @@ PowerUp.ModifiablePath
21832186 $Out | Add-Member Noteproperty 'StartName' $ServiceDetails.startname
21842187 $Out | Add-Member Noteproperty 'AbuseFunction' "Invoke-ServiceAbuse -Name '$($ServiceDetails.name)'"
21852188 $Out | Add-Member Noteproperty 'CanRestart' ([Bool]$CanRestart)
2189+ $Out | Add-Member Aliasproperty Name ServiceName
21862190 $Out.PSObject.TypeNames.Insert(0, 'PowerUp.ModifiableService')
21872191 $Out
21882192 }
@@ -3146,6 +3150,7 @@ http://www.greyhathacker.net/?p=738
31463150 ForEach ($ModifidablePath in $ModifidablePaths) {
31473151 if ($Null -ne $ModifidablePath.ModifiablePath) {
31483152 $ModifidablePath | Add-Member Noteproperty '%PATH%' $_
3153+ $ModifidablePath | Add-Member Aliasproperty Name '%PATH%'
31493154 $ModifidablePath.PSObject.TypeNames.Insert(0, 'PowerUp.HijackableDLL.Path')
31503155 $ModifidablePath
31513156 }
@@ -3576,6 +3581,7 @@ Custom PSObject containing results.
35763581 $Out | Add-Member Noteproperty 'Key' "$ParentPath\$Name"
35773582 $Out | Add-Member Noteproperty 'Path' $Path
35783583 $Out | Add-Member Noteproperty 'ModifiableFile' $_
3584+ $Out | Add-Member Aliasproperty Name Key
35793585 $Out.PSObject.TypeNames.Insert(0, 'PowerUp.ModifiableRegistryAutoRun')
35803586 $Out
35813587 }
@@ -3648,6 +3654,7 @@ Custom PSObject containing results.
36483654 $Out | Add-Member Noteproperty 'TaskName' $TaskName
36493655 $Out | Add-Member Noteproperty 'TaskFilePath' $_
36503656 $Out | Add-Member Noteproperty 'TaskTrigger' $TaskTrigger
3657+ $Out | Add-Member Aliasproperty Name TaskName
36513658 $Out.PSObject.TypeNames.Insert(0, 'PowerUp.ModifiableScheduledTaskFile')
36523659 $Out
36533660 }
@@ -3658,6 +3665,7 @@ Custom PSObject containing results.
36583665 $Out | Add-Member Noteproperty 'TaskName' $TaskName
36593666 $Out | Add-Member Noteproperty 'TaskFilePath' $_
36603667 $Out | Add-Member Noteproperty 'TaskTrigger' $TaskTrigger
3668+ $Out | Add-Member Aliasproperty Name TaskName
36613669 $Out.PSObject.TypeNames.Insert(0, 'PowerUp.ModifiableScheduledTaskFile')
36623670 $Out
36633671 }
@@ -3722,6 +3730,7 @@ Custom PSObject containing results.
37223730 $SearchLocations | Where-Object { Test-Path $_ } | ForEach-Object {
37233731 $Out = New-Object PSObject
37243732 $Out | Add-Member Noteproperty 'UnattendPath' $_
3733+ $Out | Add-Member Aliasproperty Name UnattendPath
37253734 $Out.PSObject.TypeNames.Insert(0, 'PowerUp.UnattendedInstallFile')
37263735 $Out
37273736 }
0 commit comments