123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168 |
- // Copyright (c) Athena Dev Teams - Licensed under GNU GPL
- // For more information, see LICENCE in the main folder
- #include "winapi.hpp"
- #include "cbasetypes.h"
- // Taken from https://support.microsoft.com/de-de/help/118626/how-to-determine-whether-a-thread-is-running-in-user-context-of-local
- bool IsCurrentUserLocalAdministrator(void){
- #ifdef WIN32
- BOOL fReturn = FALSE;
- DWORD dwStatus;
- DWORD dwAccessMask;
- DWORD dwAccessDesired;
- DWORD dwACLSize;
- DWORD dwStructureSize = sizeof(PRIVILEGE_SET);
- PACL pACL = NULL;
- PSID psidAdmin = NULL;
- HANDLE hToken = NULL;
- HANDLE hImpersonationToken = NULL;
- PRIVILEGE_SET ps;
- GENERIC_MAPPING GenericMapping;
- PSECURITY_DESCRIPTOR psdAdmin = NULL;
- SID_IDENTIFIER_AUTHORITY SystemSidAuthority = SECURITY_NT_AUTHORITY;
- /*
- Determine if the current thread is running as a user that is a member
- of the local admins group.
- To do this, create a security descriptor that has a DACL which has an ACE
- that allows only local aministrators access.
- Then, call AccessCheck with the current thread's token and the security
- descriptor. It will say whether the user could access an object if it
- had that security descriptor.
-
- Note: you do not need to actually create the object. Just checking access
- against the security descriptor alone will be sufficient.
- */
- const DWORD ACCESS_READ = 1;
- const DWORD ACCESS_WRITE = 2;
- __try
- {
- /*
- AccessCheck() requires an impersonation token. We first get a
- primary token and then create a duplicate impersonation token. The
- impersonation token is not actually assigned to the thread, but is
- used in the call to AccessCheck. Thus, this function itself never
- impersonates, but does use the identity of the thread. If the
- thread was impersonating already, this function uses that impersonation
- context.
- */
- if (!OpenThreadToken(GetCurrentThread(), TOKEN_DUPLICATE | TOKEN_QUERY,
- TRUE, &hToken))
- {
- if (GetLastError() != ERROR_NO_TOKEN)
- __leave;
- if (!OpenProcessToken(GetCurrentProcess(),
- TOKEN_DUPLICATE | TOKEN_QUERY, &hToken))
- __leave;
- }
- if (!DuplicateToken(hToken, SecurityImpersonation,
- &hImpersonationToken))
- __leave;
- /*
- Create the binary representation of the well-known SID that
- represents the local administrators group. Then create the
- security
- descriptor and DACL with an ACE that allows only local admins
- access.
- After that, perform the access check. This will determine whether
- the current user is a local admin.
- */
- if (!AllocateAndInitializeSid(&SystemSidAuthority, 2,
- SECURITY_BUILTIN_DOMAIN_RID,
- DOMAIN_ALIAS_RID_ADMINS,
- 0, 0, 0, 0, 0, 0, &psidAdmin))
- __leave;
- psdAdmin = LocalAlloc(LPTR, SECURITY_DESCRIPTOR_MIN_LENGTH);
- if (psdAdmin == NULL)
- __leave;
- if (!InitializeSecurityDescriptor(psdAdmin,
- SECURITY_DESCRIPTOR_REVISION))
- __leave;
- // Compute size needed for the ACL.
- dwACLSize = sizeof(ACL) + sizeof(ACCESS_ALLOWED_ACE) +
- GetLengthSid(psidAdmin) - sizeof(DWORD);
- pACL = (PACL)LocalAlloc(LPTR, dwACLSize);
- if (pACL == NULL)
- __leave;
- if (!InitializeAcl(pACL, dwACLSize, ACL_REVISION2))
- __leave;
- dwAccessMask = ACCESS_READ | ACCESS_WRITE;
- if (!AddAccessAllowedAce(pACL, ACL_REVISION2, dwAccessMask,
- psidAdmin))
- __leave;
- if (!SetSecurityDescriptorDacl(psdAdmin, TRUE, pACL, FALSE))
- __leave;
- /*
- AccessCheck validates a security descriptor somewhat;
- set the group and owner so that enough of the security descriptor is
- filled out to make AccessCheck happy.
- */
- SetSecurityDescriptorGroup(psdAdmin, psidAdmin, FALSE);
- SetSecurityDescriptorOwner(psdAdmin, psidAdmin, FALSE);
- if (!IsValidSecurityDescriptor(psdAdmin))
- __leave;
- dwAccessDesired = ACCESS_READ;
- /*
- Initialize GenericMapping structure even though you
- do not use generic rights.
- */
- GenericMapping.GenericRead = ACCESS_READ;
- GenericMapping.GenericWrite = ACCESS_WRITE;
- GenericMapping.GenericExecute = 0;
- GenericMapping.GenericAll = ACCESS_READ | ACCESS_WRITE;
- if (!AccessCheck(psdAdmin, hImpersonationToken, dwAccessDesired,
- &GenericMapping, &ps, &dwStructureSize, &dwStatus,
- &fReturn))
- {
- fReturn = FALSE;
- __leave;
- }
- }
- __finally
- {
- // Clean up.
- if (pACL) LocalFree(pACL);
- if (psdAdmin) LocalFree(psdAdmin);
- if (psidAdmin) FreeSid(psidAdmin);
- if (hImpersonationToken) CloseHandle(hImpersonationToken);
- if (hToken) CloseHandle(hToken);
- }
- return fReturn;
- #else
- return false;
- #endif
- }
|