| 
                         从2009年7月的一篇名为 
 Inside Windows 7 User Account Control的Technet文章中,Mark Russinovish描述了以标准用户身份运行的应用程序可以默默地提升并获得管理权限: 
  
  
   
  …it’s possible for third-party  software running in a PA (Protected Administrator) account with  standard user rights to take advantage  of auto-elevation to gain  administrative rights. For example,  the software can use the  07001 to inject code into Explorer and the  07002 to execute that code,a technique called DLL  injection. Since the code is executing  in Explorer,which is a Windows  executable,it can leverage the COM  objects that auto-elevate,like the  Copy/Move/Rename/Delete/Link Object,  to modify system registry keys or  directories and give the software  administrative rights.  
   
 他接着提到恶意软件永远不会这样做,因为它太难了:  
  
  
  …these steps require  deliberate intent,aren’t trivial…  
   
 最后  
  
  
  …malware could gain administrative  rights using the same techniques.  
   
 所以我很想看到一个实际的实现.  
 我原以为PROCESS_VM_WRITE将是一个没有给予标准用户的权利.  
 注意:我自己永远不会做任何不好的事情,对世界上其他所有开发者来说也是如此. 
 龙征,在 
 istartedsomething.com有一些关于自动提升申请的帖子.他不是源代码的作者,但他链接到做出概念验证的人. 
  
 你可以阅读更多关于它here.                         (编辑:莱芜站长网) 
【声明】本站内容均来自网络,其相关言论仅代表作者个人观点,不代表本站立场。若无意侵犯到您的权利,请及时与联系站长删除相关内容! 
                     |