mirror of
https://github.com/hashcat/hashcat.git
synced 2024-11-23 00:28:11 +00:00
136 lines
3.2 KiB
C++
136 lines
3.2 KiB
C++
static void SetACLPrivileges();
|
|
|
|
static bool ReadSacl=false;
|
|
|
|
|
|
|
|
#ifndef SFX_MODULE
|
|
void ExtractACL20(Archive &Arc,const wchar *FileName)
|
|
{
|
|
SetACLPrivileges();
|
|
|
|
if (Arc.BrokenHeader)
|
|
{
|
|
uiMsg(UIERROR_ACLBROKEN,Arc.FileName,FileName);
|
|
ErrHandler.SetErrorCode(RARX_CRC);
|
|
return;
|
|
}
|
|
|
|
if (Arc.EAHead.Method<0x31 || Arc.EAHead.Method>0x35 || Arc.EAHead.UnpVer>VER_PACK)
|
|
{
|
|
uiMsg(UIERROR_ACLUNKNOWN,Arc.FileName,FileName);
|
|
ErrHandler.SetErrorCode(RARX_WARNING);
|
|
return;
|
|
}
|
|
|
|
ComprDataIO DataIO;
|
|
Unpack Unpack(&DataIO);
|
|
Unpack.Init(0x10000,false);
|
|
|
|
Array<byte> UnpData(Arc.EAHead.UnpSize);
|
|
DataIO.SetUnpackToMemory(&UnpData[0],Arc.EAHead.UnpSize);
|
|
DataIO.SetPackedSizeToRead(Arc.EAHead.DataSize);
|
|
DataIO.EnableShowProgress(false);
|
|
DataIO.SetFiles(&Arc,NULL);
|
|
DataIO.UnpHash.Init(HASH_CRC32,1);
|
|
Unpack.SetDestSize(Arc.EAHead.UnpSize);
|
|
Unpack.DoUnpack(Arc.EAHead.UnpVer,false);
|
|
|
|
if (Arc.EAHead.EACRC!=DataIO.UnpHash.GetCRC32())
|
|
{
|
|
uiMsg(UIERROR_ACLBROKEN,Arc.FileName,FileName);
|
|
ErrHandler.SetErrorCode(RARX_CRC);
|
|
return;
|
|
}
|
|
|
|
SECURITY_INFORMATION si=OWNER_SECURITY_INFORMATION|GROUP_SECURITY_INFORMATION|
|
|
DACL_SECURITY_INFORMATION;
|
|
if (ReadSacl)
|
|
si|=SACL_SECURITY_INFORMATION;
|
|
SECURITY_DESCRIPTOR *sd=(SECURITY_DESCRIPTOR *)&UnpData[0];
|
|
|
|
int SetCode=SetFileSecurity(FileName,si,sd);
|
|
|
|
if (!SetCode)
|
|
{
|
|
uiMsg(UIERROR_ACLSET,Arc.FileName,FileName);
|
|
DWORD LastError=GetLastError();
|
|
ErrHandler.SysErrMsg();
|
|
if (LastError==ERROR_ACCESS_DENIED && !IsUserAdmin())
|
|
uiMsg(UIERROR_NEEDADMIN);
|
|
ErrHandler.SetErrorCode(RARX_WARNING);
|
|
}
|
|
}
|
|
#endif
|
|
|
|
|
|
void ExtractACL(Archive &Arc,const wchar *FileName)
|
|
{
|
|
Array<byte> SubData;
|
|
if (!Arc.ReadSubData(&SubData,NULL,false))
|
|
return;
|
|
|
|
SetACLPrivileges();
|
|
|
|
SECURITY_INFORMATION si=OWNER_SECURITY_INFORMATION|GROUP_SECURITY_INFORMATION|
|
|
DACL_SECURITY_INFORMATION;
|
|
if (ReadSacl)
|
|
si|=SACL_SECURITY_INFORMATION;
|
|
SECURITY_DESCRIPTOR *sd=(SECURITY_DESCRIPTOR *)&SubData[0];
|
|
|
|
int SetCode=SetFileSecurity(FileName,si,sd);
|
|
if (!SetCode)
|
|
{
|
|
wchar LongName[NM];
|
|
if (GetWinLongPath(FileName,LongName,ASIZE(LongName)))
|
|
SetCode=SetFileSecurity(LongName,si,sd);
|
|
}
|
|
|
|
if (!SetCode)
|
|
{
|
|
uiMsg(UIERROR_ACLSET,Arc.FileName,FileName);
|
|
DWORD LastError=GetLastError();
|
|
ErrHandler.SysErrMsg();
|
|
if (LastError==ERROR_ACCESS_DENIED && !IsUserAdmin())
|
|
uiMsg(UIERROR_NEEDADMIN);
|
|
ErrHandler.SetErrorCode(RARX_WARNING);
|
|
}
|
|
}
|
|
|
|
|
|
void SetACLPrivileges()
|
|
{
|
|
static bool InitDone=false;
|
|
if (InitDone)
|
|
return;
|
|
|
|
if (SetPrivilege(SE_SECURITY_NAME))
|
|
ReadSacl=true;
|
|
SetPrivilege(SE_RESTORE_NAME);
|
|
|
|
InitDone=true;
|
|
}
|
|
|
|
|
|
bool SetPrivilege(LPCTSTR PrivName)
|
|
{
|
|
bool Success=false;
|
|
|
|
HANDLE hToken;
|
|
if (OpenProcessToken(GetCurrentProcess(), TOKEN_ADJUST_PRIVILEGES, &hToken))
|
|
{
|
|
TOKEN_PRIVILEGES tp;
|
|
tp.PrivilegeCount = 1;
|
|
tp.Privileges[0].Attributes = SE_PRIVILEGE_ENABLED;
|
|
|
|
if (LookupPrivilegeValue(NULL,PrivName,&tp.Privileges[0].Luid) &&
|
|
AdjustTokenPrivileges(hToken, FALSE, &tp, 0, NULL, NULL) &&
|
|
GetLastError() == ERROR_SUCCESS)
|
|
Success=true;
|
|
|
|
CloseHandle(hToken);
|
|
}
|
|
|
|
return Success;
|
|
}
|