Alex Hirsch
9 years ago
6 changed files with 82 additions and 83 deletions
@ -1,28 +1,75 @@ |
|||
function Import-Registry($reg) { |
|||
# add reg file hander |
|||
$reg = "Windows Registry Editor Version 5.00`r`n`r`n" + $reg |
|||
|
|||
# store, import and remove reg file |
|||
$regfile = "$env:windir\Temp\registry.reg" |
|||
$reg | Out-File $regfile |
|||
Start-Process "regedit.exe" -ArgumentList ("/s", "$regfile") -Wait |
|||
rm $regfile |
|||
} |
|||
|
|||
function Takeown-Registry($key) { |
|||
# TODO works only for LocalMachine for now |
|||
$key = $key.substring(19) |
|||
|
|||
# set owner |
|||
$key = [Microsoft.Win32.Registry]::LocalMachine.OpenSubKey("SOFTWARE\Microsoft\Windows Defender\Spynet", "ReadWriteSubTree", "TakeOwnership") |
|||
$owner = [Security.Principal.NTAccount]"Administrators" |
|||
$acl = $key.GetAccessControl() |
|||
$acl.SetOwner($owner) |
|||
$key.SetAccessControl($acl) |
|||
|
|||
# set FullControl |
|||
$acl = $key.GetAccessControl() |
|||
$rule = New-Object System.Security.AccessControl.RegistryAccessRule("Administrators", "FullControl", "Allow") |
|||
$acl.SetAccessRule($rule) |
|||
$key.SetAccessControl($acl) |
|||
} |
|||
function Import-Registry($reg) { |
|||
# add reg file hander |
|||
$reg = "Windows Registry Editor Version 5.00`r`n`r`n" + $reg |
|||
|
|||
# store, import and remove reg file |
|||
$regfile = "$env:windir\Temp\registry.reg" |
|||
$reg | Out-File $regfile |
|||
Start-Process "regedit.exe" -ArgumentList ("/s", "$regfile") -Wait |
|||
rm $regfile |
|||
} |
|||
|
|||
function Takeown-Registry($key) { |
|||
# TODO works only for LocalMachine for now |
|||
$key = $key.substring(19) |
|||
|
|||
# set owner |
|||
$key = [Microsoft.Win32.Registry]::LocalMachine.OpenSubKey("SOFTWARE\Microsoft\Windows Defender\Spynet", "ReadWriteSubTree", "TakeOwnership") |
|||
$owner = [Security.Principal.NTAccount]"Administrators" |
|||
$acl = $key.GetAccessControl() |
|||
$acl.SetOwner($owner) |
|||
$key.SetAccessControl($acl) |
|||
|
|||
# set FullControl |
|||
$acl = $key.GetAccessControl() |
|||
$rule = New-Object System.Security.AccessControl.RegistryAccessRule("Administrators", "FullControl", "Allow") |
|||
$acl.SetAccessRule($rule) |
|||
$key.SetAccessControl($acl) |
|||
} |
|||
|
|||
function Elevate-Privileges { |
|||
param($Privilege) |
|||
$Definition = @" |
|||
using System; |
|||
using System.Runtime.InteropServices; |
|||
|
|||
public class AdjPriv { |
|||
[DllImport("advapi32.dll", ExactSpelling = true, SetLastError = true)] |
|||
internal static extern bool AdjustTokenPrivileges(IntPtr htok, bool disall, ref TokPriv1Luid newst, int len, IntPtr prev, IntPtr rele); |
|||
|
|||
[DllImport("advapi32.dll", ExactSpelling = true, SetLastError = true)] |
|||
internal static extern bool OpenProcessToken(IntPtr h, int acc, ref IntPtr phtok); |
|||
|
|||
[DllImport("advapi32.dll", SetLastError = true)] |
|||
internal static extern bool LookupPrivilegeValue(string host, string name, ref long pluid); |
|||
|
|||
[StructLayout(LayoutKind.Sequential, Pack = 1)] |
|||
internal struct TokPriv1Luid { |
|||
public int Count; |
|||
public long Luid; |
|||
public int Attr; |
|||
} |
|||
|
|||
internal const int SE_PRIVILEGE_ENABLED = 0x00000002; |
|||
internal const int TOKEN_QUERY = 0x00000008; |
|||
internal const int TOKEN_ADJUST_PRIVILEGES = 0x00000020; |
|||
|
|||
public static bool EnablePrivilege(long processHandle, string privilege) { |
|||
bool retVal; |
|||
TokPriv1Luid tp; |
|||
IntPtr hproc = new IntPtr(processHandle); |
|||
IntPtr htok = IntPtr.Zero; |
|||
retVal = OpenProcessToken(hproc, TOKEN_ADJUST_PRIVILEGES | TOKEN_QUERY, ref htok); |
|||
tp.Count = 1; |
|||
tp.Luid = 0; |
|||
tp.Attr = SE_PRIVILEGE_ENABLED; |
|||
retVal = LookupPrivilegeValue(null, privilege, ref tp.Luid); |
|||
retVal = AdjustTokenPrivileges(htok, false, ref tp, 0, IntPtr.Zero, IntPtr.Zero); |
|||
return retVal; |
|||
} |
|||
} |
|||
"@ |
|||
$ProcessHandle = (Get-Process -id $pid).Handle |
|||
$type = Add-Type $definition -PassThru |
|||
$type[0]::EnablePrivilege($processHandle, $Privilege) |
|||
} |
|||
|
Loading…
Reference in new issue