从2009年7月的一篇名为
Inside Windows 7 User Account Control的Technet文章中,Mark Russinovish描述了以标准用户身份运行的应用程序可以默默地提升并获得管理权限:
…it’s possible for third-party software running in a PA (Protected Administrator) account with standard user rights to take advantage of auto-elevation to gain administrative rights. For example, the software can use the 07001 to inject code into Explorer and the 07002 to execute that code,a technique called DLL injection. Since the code is executing in Explorer,which is a Windows executable,it can leverage the COM objects that auto-elevate,like the Copy/Move/Rename/Delete/Link Object, to modify system registry keys or directories and give the software administrative rights.
他接着提到恶意软件永远不会这样做,因为它太难了:
…these steps require deliberate intent,aren’t trivial…
最后
…malware could gain administrative rights using the same techniques.
所以我很想看到一个实际的实现.
我原以为PROCESS_VM_WRITE将是一个没有给予标准用户的权利.
注意:我自己永远不会做任何不好的事情,对世界上其他所有开发者来说也是如此.
龙征,在
istartedsomething.com有一些关于自动提升申请的帖子.他不是源代码的作者,但他链接到做出概念验证的人.
你可以阅读更多关于它here. (编辑:岳阳站长网)
【声明】本站内容均来自网络,其相关言论仅代表作者个人观点,不代表本站立场。若无意侵犯到您的权利,请及时与联系站长删除相关内容!
|