Windows 7:利用自动提升来提升自己的流程?

从2009年7月的一篇名为
Inside Windows 7 User Account Control的Technet文章中,Mark Russinovish描述了以标准用户身份运行的应用程序可以默默地提升并获得管理权限:

…it’s possible for third-party
software running in a PA (Protected Administrator) account with
standard user rights to take advantage
of auto-elevation to gain
administrative rights. For example,
the software can use the
07001 to inject code into Explorer and the
07002 to execute that code,a technique called DLL
injection
. Since the code is executing
in Explorer,which is a Windows
executable,it can leverage the COM
objects that auto-elevate,like the
Copy/Move/Rename/Delete/Link Object,
to modify system registry keys or
directories and give the software
administrative rights.

他接着提到恶意软件永远不会这样做,因为它太难了:

…these steps require
deliberate intent,aren’t trivial…

最后

…malware could gain administrative
rights using the same techniques.

所以我很想看到一个实际的实现.

我原以为PROCESS_VM_WRITE将是一个没有给予标准用户的权利.

注意:我自己永远不会做任何不好的事情,对世界上其他所有开发者来说也是如此.

龙征,在
istartedsomething.com有一些关于自动提升申请的帖子.他不是源代码的作者,但他链接到做出概念验证的人.

你可以阅读更多关于它here.

dawei

【声明】:唐山站长网内容转载自互联网,其相关言论仅代表作者个人观点绝非权威,不代表本站立场。如您发现内容存在版权问题,请提交相关链接至邮箱:bqsm@foxmail.com,我们将及时予以处理。