├── .gitignore ├── Demo └── GetTrustedInstallerShell.mp4 ├── GetTrustedInstallerShell.sln ├── GetTrustedInstallerShell ├── GetTrustedInstallerShell.vcxproj ├── GetTrustedInstallerShell.vcxproj.filters └── src │ └── main.cpp ├── LICENSE └── README.md /.gitignore: -------------------------------------------------------------------------------- 1 | ## Ignore Visual Studio temporary files, build results, and 2 | ## files generated by popular Visual Studio add-ons. 3 | ## 4 | ## Get latest from https://github.com/github/gitignore/blob/master/VisualStudio.gitignore 5 | 6 | # User-specific files 7 | *.rsuser 8 | *.suo 9 | *.user 10 | *.userosscache 11 | *.sln.docstates 12 | 13 | # User-specific files (MonoDevelop/Xamarin Studio) 14 | *.userprefs 15 | 16 | # Mono auto generated files 17 | mono_crash.* 18 | 19 | # Build results 20 | [Dd]ebug/ 21 | [Dd]ebugPublic/ 22 | [Rr]elease/ 23 | [Rr]eleases/ 24 | x64/ 25 | x86/ 26 | [Aa][Rr][Mm]/ 27 | [Aa][Rr][Mm]64/ 28 | bld/ 29 | [Bb]in/ 30 | [Oo]bj/ 31 | [Ll]og/ 32 | [Ll]ogs/ 33 | 34 | # Visual Studio 2015/2017 cache/options directory 35 | .vs/ 36 | # Uncomment if you have tasks that create the project's static files in wwwroot 37 | #wwwroot/ 38 | 39 | # Visual Studio 2017 auto generated files 40 | Generated\ Files/ 41 | 42 | # MSTest test Results 43 | [Tt]est[Rr]esult*/ 44 | [Bb]uild[Ll]og.* 45 | 46 | # NUnit 47 | *.VisualState.xml 48 | TestResult.xml 49 | nunit-*.xml 50 | 51 | # Build Results of an ATL Project 52 | [Dd]ebugPS/ 53 | [Rr]eleasePS/ 54 | dlldata.c 55 | 56 | # Benchmark Results 57 | BenchmarkDotNet.Artifacts/ 58 | 59 | # .NET Core 60 | project.lock.json 61 | project.fragment.lock.json 62 | artifacts/ 63 | 64 | # StyleCop 65 | StyleCopReport.xml 66 | 67 | # Files built by Visual Studio 68 | *_i.c 69 | *_p.c 70 | *_h.h 71 | *.ilk 72 | *.meta 73 | *.obj 74 | *.iobj 75 | *.pch 76 | *.pdb 77 | *.ipdb 78 | *.pgc 79 | *.pgd 80 | *.rsp 81 | *.sbr 82 | *.tlb 83 | *.tli 84 | *.tlh 85 | *.tmp 86 | *.tmp_proj 87 | *_wpftmp.csproj 88 | *.log 89 | *.vspscc 90 | *.vssscc 91 | .builds 92 | *.pidb 93 | *.svclog 94 | *.scc 95 | 96 | # Chutzpah Test files 97 | _Chutzpah* 98 | 99 | # Visual C++ cache files 100 | ipch/ 101 | *.aps 102 | *.ncb 103 | *.opendb 104 | *.opensdf 105 | *.sdf 106 | *.cachefile 107 | *.VC.db 108 | *.VC.VC.opendb 109 | 110 | # Visual Studio profiler 111 | *.psess 112 | *.vsp 113 | *.vspx 114 | *.sap 115 | 116 | # Visual Studio Trace Files 117 | *.e2e 118 | 119 | # TFS 2012 Local Workspace 120 | $tf/ 121 | 122 | # Guidance Automation Toolkit 123 | *.gpState 124 | 125 | # ReSharper is a .NET coding add-in 126 | _ReSharper*/ 127 | *.[Rr]e[Ss]harper 128 | *.DotSettings.user 129 | 130 | # TeamCity is a build add-in 131 | _TeamCity* 132 | 133 | # DotCover is a Code Coverage Tool 134 | *.dotCover 135 | 136 | # AxoCover is a Code Coverage Tool 137 | .axoCover/* 138 | !.axoCover/settings.json 139 | 140 | # Visual Studio code coverage results 141 | *.coverage 142 | *.coveragexml 143 | 144 | # NCrunch 145 | _NCrunch_* 146 | .*crunch*.local.xml 147 | nCrunchTemp_* 148 | 149 | # MightyMoose 150 | *.mm.* 151 | AutoTest.Net/ 152 | 153 | # Web workbench (sass) 154 | .sass-cache/ 155 | 156 | # Installshield output folder 157 | [Ee]xpress/ 158 | 159 | # DocProject is a documentation generator add-in 160 | DocProject/buildhelp/ 161 | DocProject/Help/*.HxT 162 | DocProject/Help/*.HxC 163 | DocProject/Help/*.hhc 164 | DocProject/Help/*.hhk 165 | DocProject/Help/*.hhp 166 | DocProject/Help/Html2 167 | DocProject/Help/html 168 | 169 | # Click-Once directory 170 | publish/ 171 | 172 | # Publish Web Output 173 | *.[Pp]ublish.xml 174 | *.azurePubxml 175 | # Note: Comment the next line if you want to checkin your web deploy settings, 176 | # but database connection strings (with potential passwords) will be unencrypted 177 | *.pubxml 178 | *.publishproj 179 | 180 | # Microsoft Azure Web App publish settings. Comment the next line if you want to 181 | # checkin your Azure Web App publish settings, but sensitive information contained 182 | # in these scripts will be unencrypted 183 | PublishScripts/ 184 | 185 | # NuGet Packages 186 | *.nupkg 187 | # NuGet Symbol Packages 188 | *.snupkg 189 | # The packages folder can be ignored because of Package Restore 190 | **/[Pp]ackages/* 191 | # except build/, which is used as an MSBuild target. 192 | !**/[Pp]ackages/build/ 193 | # Uncomment if necessary however generally it will be regenerated when needed 194 | #!**/[Pp]ackages/repositories.config 195 | # NuGet v3's project.json files produces more ignorable files 196 | *.nuget.props 197 | *.nuget.targets 198 | 199 | # Microsoft Azure Build Output 200 | csx/ 201 | *.build.csdef 202 | 203 | # Microsoft Azure Emulator 204 | ecf/ 205 | rcf/ 206 | 207 | # Windows Store app package directories and files 208 | AppPackages/ 209 | BundleArtifacts/ 210 | Package.StoreAssociation.xml 211 | _pkginfo.txt 212 | *.appx 213 | *.appxbundle 214 | *.appxupload 215 | 216 | # Visual Studio cache files 217 | # files ending in .cache can be ignored 218 | *.[Cc]ache 219 | # but keep track of directories ending in .cache 220 | !?*.[Cc]ache/ 221 | 222 | # Others 223 | ClientBin/ 224 | ~$* 225 | *~ 226 | *.dbmdl 227 | *.dbproj.schemaview 228 | *.jfm 229 | *.pfx 230 | *.publishsettings 231 | orleans.codegen.cs 232 | 233 | # Including strong name files can present a security risk 234 | # (https://github.com/github/gitignore/pull/2483#issue-259490424) 235 | #*.snk 236 | 237 | # Since there are multiple workflows, uncomment next line to ignore bower_components 238 | # (https://github.com/github/gitignore/pull/1529#issuecomment-104372622) 239 | #bower_components/ 240 | 241 | # RIA/Silverlight projects 242 | Generated_Code/ 243 | 244 | # Backup & report files from converting an old project file 245 | # to a newer Visual Studio version. Backup files are not needed, 246 | # because we have git ;-) 247 | _UpgradeReport_Files/ 248 | Backup*/ 249 | UpgradeLog*.XML 250 | UpgradeLog*.htm 251 | ServiceFabricBackup/ 252 | *.rptproj.bak 253 | 254 | # SQL Server files 255 | *.mdf 256 | *.ldf 257 | *.ndf 258 | 259 | # Business Intelligence projects 260 | *.rdl.data 261 | *.bim.layout 262 | *.bim_*.settings 263 | *.rptproj.rsuser 264 | *- [Bb]ackup.rdl 265 | *- [Bb]ackup ([0-9]).rdl 266 | *- [Bb]ackup ([0-9][0-9]).rdl 267 | 268 | # Microsoft Fakes 269 | FakesAssemblies/ 270 | 271 | # GhostDoc plugin setting file 272 | *.GhostDoc.xml 273 | 274 | # Node.js Tools for Visual Studio 275 | .ntvs_analysis.dat 276 | node_modules/ 277 | 278 | # Visual Studio 6 build log 279 | *.plg 280 | 281 | # Visual Studio 6 workspace options file 282 | *.opt 283 | 284 | # Visual Studio 6 auto-generated workspace file (contains which files were open etc.) 285 | *.vbw 286 | 287 | # Visual Studio LightSwitch build output 288 | **/*.HTMLClient/GeneratedArtifacts 289 | **/*.DesktopClient/GeneratedArtifacts 290 | **/*.DesktopClient/ModelManifest.xml 291 | **/*.Server/GeneratedArtifacts 292 | **/*.Server/ModelManifest.xml 293 | _Pvt_Extensions 294 | 295 | # Paket dependency manager 296 | .paket/paket.exe 297 | paket-files/ 298 | 299 | # FAKE - F# Make 300 | .fake/ 301 | 302 | # CodeRush personal settings 303 | .cr/personal 304 | 305 | # Python Tools for Visual Studio (PTVS) 306 | __pycache__/ 307 | *.pyc 308 | 309 | # Cake - Uncomment if you are using it 310 | # tools/** 311 | # !tools/packages.config 312 | 313 | # Tabs Studio 314 | *.tss 315 | 316 | # Telerik's JustMock configuration file 317 | *.jmconfig 318 | 319 | # BizTalk build output 320 | *.btp.cs 321 | *.btm.cs 322 | *.odx.cs 323 | *.xsd.cs 324 | 325 | # OpenCover UI analysis results 326 | OpenCover/ 327 | 328 | # Azure Stream Analytics local run output 329 | ASALocalRun/ 330 | 331 | # MSBuild Binary and Structured Log 332 | *.binlog 333 | 334 | # NVidia Nsight GPU debugger configuration file 335 | *.nvuser 336 | 337 | # MFractors (Xamarin productivity tool) working folder 338 | .mfractor/ 339 | 340 | # Local History for Visual Studio 341 | .localhistory/ 342 | 343 | # BeatPulse healthcheck temp database 344 | healthchecksdb 345 | 346 | # Backup folder for Package Reference Convert tool in Visual Studio 2017 347 | MigrationBackup/ 348 | 349 | # Ionide (cross platform F# VS Code tools) working folder 350 | .ionide/ 351 | -------------------------------------------------------------------------------- /Demo/GetTrustedInstallerShell.mp4: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/wilszdev/GetTrustedInstallerShell/b0ab04bc44e21256086a4337bc2a75a6cff86f5c/Demo/GetTrustedInstallerShell.mp4 -------------------------------------------------------------------------------- /GetTrustedInstallerShell.sln: -------------------------------------------------------------------------------- 1 |  2 | Microsoft Visual Studio Solution File, Format Version 12.00 3 | # Visual Studio Version 16 4 | VisualStudioVersion = 16.0.31005.135 5 | MinimumVisualStudioVersion = 10.0.40219.1 6 | Project("{8BC9CEB8-8B4A-11D0-8D11-00A0C91BC942}") = "GetTrustedInstallerShell", "GetTrustedInstallerShell\GetTrustedInstallerShell.vcxproj", "{2446785E-E78E-45F0-A89E-FEA778C1E51B}" 7 | EndProject 8 | Global 9 | GlobalSection(SolutionConfigurationPlatforms) = preSolution 10 | Debug|x64 = Debug|x64 11 | Debug|x86 = Debug|x86 12 | Release|x64 = Release|x64 13 | Release|x86 = Release|x86 14 | EndGlobalSection 15 | GlobalSection(ProjectConfigurationPlatforms) = postSolution 16 | {2446785E-E78E-45F0-A89E-FEA778C1E51B}.Debug|x64.ActiveCfg = Debug|x64 17 | {2446785E-E78E-45F0-A89E-FEA778C1E51B}.Debug|x64.Build.0 = Debug|x64 18 | {2446785E-E78E-45F0-A89E-FEA778C1E51B}.Debug|x86.ActiveCfg = Debug|Win32 19 | {2446785E-E78E-45F0-A89E-FEA778C1E51B}.Debug|x86.Build.0 = Debug|Win32 20 | {2446785E-E78E-45F0-A89E-FEA778C1E51B}.Release|x64.ActiveCfg = Release|x64 21 | {2446785E-E78E-45F0-A89E-FEA778C1E51B}.Release|x64.Build.0 = Release|x64 22 | {2446785E-E78E-45F0-A89E-FEA778C1E51B}.Release|x86.ActiveCfg = Release|Win32 23 | {2446785E-E78E-45F0-A89E-FEA778C1E51B}.Release|x86.Build.0 = Release|Win32 24 | EndGlobalSection 25 | GlobalSection(SolutionProperties) = preSolution 26 | HideSolutionNode = FALSE 27 | EndGlobalSection 28 | GlobalSection(ExtensibilityGlobals) = postSolution 29 | SolutionGuid = {BAB527F6-C17C-4BF4-9446-F118A022E8D1} 30 | EndGlobalSection 31 | EndGlobal 32 | -------------------------------------------------------------------------------- /GetTrustedInstallerShell/GetTrustedInstallerShell.vcxproj: -------------------------------------------------------------------------------- 1 | 2 | 3 | 4 | 5 | Debug 6 | Win32 7 | 8 | 9 | Release 10 | Win32 11 | 12 | 13 | Debug 14 | x64 15 | 16 | 17 | Release 18 | x64 19 | 20 | 21 | 22 | 16.0 23 | Win32Proj 24 | {2446785e-e78e-45f0-a89e-fea778c1e51b} 25 | GetTrustedInstallerShell 26 | 10.0 27 | 28 | 29 | 30 | Application 31 | true 32 | v142 33 | Unicode 34 | 35 | 36 | Application 37 | false 38 | v142 39 | true 40 | Unicode 41 | 42 | 43 | Application 44 | true 45 | v142 46 | Unicode 47 | 48 | 49 | Application 50 | false 51 | v142 52 | true 53 | Unicode 54 | 55 | 56 | 57 | 58 | 59 | 60 | 61 | 62 | 63 | 64 | 65 | 66 | 67 | 68 | 69 | 70 | 71 | 72 | 73 | 74 | true 75 | 76 | 77 | false 78 | 79 | 80 | true 81 | 82 | 83 | false 84 | 85 | 86 | 87 | Level3 88 | true 89 | WIN32;_DEBUG;_CONSOLE;%(PreprocessorDefinitions) 90 | true 91 | 92 | 93 | Console 94 | true 95 | 96 | 97 | 98 | 99 | Level3 100 | true 101 | true 102 | true 103 | WIN32;NDEBUG;_CONSOLE;%(PreprocessorDefinitions) 104 | true 105 | MultiThreaded 106 | 107 | 108 | Console 109 | true 110 | true 111 | true 112 | 113 | 114 | 115 | 116 | Level3 117 | true 118 | _DEBUG;_CONSOLE;%(PreprocessorDefinitions) 119 | true 120 | 121 | 122 | Console 123 | true 124 | 125 | 126 | 127 | 128 | Level3 129 | true 130 | true 131 | true 132 | NDEBUG;_CONSOLE;%(PreprocessorDefinitions) 133 | true 134 | 135 | 136 | Console 137 | true 138 | true 139 | true 140 | 141 | 142 | 143 | 144 | 145 | 146 | 147 | 148 | -------------------------------------------------------------------------------- /GetTrustedInstallerShell/GetTrustedInstallerShell.vcxproj.filters: -------------------------------------------------------------------------------- 1 |  2 | 3 | 4 | 5 | {4FC737F1-C7A5-4376-A066-2A32D752A2FF} 6 | cpp;c;cc;cxx;c++;cppm;ixx;def;odl;idl;hpj;bat;asm;asmx 7 | 8 | 9 | {93995380-89BD-4b04-88EB-625FBE52EBFB} 10 | h;hh;hpp;hxx;h++;hm;inl;inc;ipp;xsd 11 | 12 | 13 | {67DA6AB6-F800-4c08-8B7A-83BB121AAD01} 14 | rc;ico;cur;bmp;dlg;rc2;rct;bin;rgs;gif;jpg;jpeg;jpe;resx;tiff;tif;png;wav;mfcribbon-ms 15 | 16 | 17 | 18 | 19 | Source Files 20 | 21 | 22 | -------------------------------------------------------------------------------- /GetTrustedInstallerShell/src/main.cpp: -------------------------------------------------------------------------------- 1 | #define WIN32_LEAN_AND_MEAN 2 | #include 3 | #include 4 | #include 5 | #include 6 | #include 7 | 8 | /// 9 | /// Displays a message, followed by the descriptor for a win32 error code 10 | /// 11 | /// : message to display, precedes error description 12 | /// : win32 error code. optional. 13 | void PrintError(const char* msg, DWORD err = -1); 14 | /// 15 | /// Get a handle to the primary token of a process 16 | /// 17 | /// : target process id. if value is 0, gets token for current process 18 | /// handle to the process' token 19 | HANDLE GetProcessToken(DWORD pid); 20 | /// 21 | /// Duplicate a token with the specified type 22 | /// 23 | /// : target process id 24 | /// : type of token (impersonation or primary) 25 | /// handle to the duplicate token 26 | HANDLE DuplicateProcessToken(DWORD pid, TOKEN_TYPE type); 27 | /// 28 | /// enable or disable the specified privilege 29 | /// 30 | /// : handle to process token 31 | /// : privilege name 32 | /// : TRUE to enable privilege, FALSE to disable 33 | /// win32 error code (0 on success) 34 | DWORD SetPrivilege(HANDLE hToken, LPCTSTR lpszPrivilege, BOOL bEnablePrivilege); 35 | /// 36 | /// enable debug privilege for current process 37 | /// 38 | /// true on success 39 | bool GetDebugPrivilege(); 40 | /// 41 | /// Get pid of process with specified name. 42 | /// 43 | /// : name of executable file for process 44 | /// process id 45 | DWORD GetPidByName(const wchar_t* procName); 46 | /// 47 | /// calls TerminateProcess 48 | /// 49 | /// process id of target 50 | /// success 51 | bool TerminateProcess(DWORD pid); 52 | 53 | /// 54 | /// get a shell with trustedinstaller privileges 55 | /// 56 | int main(int argc, char** argv) { 57 | #pragma region get debug privilege 58 | // get debug privilege 59 | if (!GetDebugPrivilege()) { 60 | printf("[-] could not enable debug privilege. please run as a local administrator."); 61 | return -1; 62 | } 63 | printf("[+] enabled debug privilege\n"); 64 | #pragma endregion 65 | 66 | #pragma region get target pid 67 | // pid 68 | DWORD pid; 69 | if (argc == 2) 70 | /* 71 | * use 1st argument as target pid. 72 | * target should be a system process, otherwise impersonating its token will not 73 | * give sufficient permissions to allow accessing the trustedinstaller token 74 | */ 75 | pid = atoi(argv[1]); 76 | else 77 | pid = GetPidByName(L"winlogon.exe"); 78 | if (pid == 0) return -1; // unable to find process (or first argument was not an integer) 79 | #pragma endregion 80 | 81 | #pragma region impersonate system 82 | // duplicate system token as an impersonation token 83 | HANDLE hImpToken = DuplicateProcessToken(pid, TOKEN_TYPE::TokenImpersonation); 84 | if (hImpToken != INVALID_HANDLE_VALUE) printf("[+] process token duplicated\n"); 85 | else { printf("[-] failed to duplicate token\n"); return -1; } 86 | 87 | // use the impersonation token 88 | HANDLE hThread = GetCurrentThread(); 89 | if (!SetThreadToken(&hThread, hImpToken)) { 90 | PrintError("SetThreadToken()", GetLastError()); 91 | return -1; 92 | } 93 | printf("[+] successfully impersonated\n"); 94 | 95 | // don't need these handles anymore 96 | CloseHandle(hThread); 97 | CloseHandle(hImpToken); 98 | #pragma endregion 99 | 100 | #pragma region start trustedinstaller 101 | // get handle to trustedinstaller service 102 | SC_HANDLE hService = OpenServiceW(OpenSCManagerW(NULL, NULL, SC_MANAGER_ALL_ACCESS), L"trustedinstaller", MAXIMUM_ALLOWED); 103 | if (!hService) { 104 | PrintError("OpenServiceW()", GetLastError()); 105 | return -1; 106 | } 107 | // check if service is already running 108 | SERVICE_STATUS_PROCESS ssp = {}; DWORD bytesNeeded; 109 | if (!QueryServiceStatusEx(hService, SC_STATUS_PROCESS_INFO, (BYTE*)&ssp, sizeof(ssp), &bytesNeeded)) { 110 | PrintError("QueryServiceStatusEx()", GetLastError()); 111 | return -1; 112 | } 113 | // if running do nothing, otherwise start service and query again 114 | if (ssp.dwCurrentState == SERVICE_RUNNING) { 115 | printf("[+] trustedinstaller service already running\n"); 116 | } 117 | else { 118 | // start 119 | if (!StartServiceW(hService, 0, NULL)) { 120 | PrintError("StartServiceW()", GetLastError()); 121 | return -1; 122 | } 123 | printf("[+] started trustedinstaller service\n"); 124 | 125 | // update ssp (interested in the pid) 126 | if (!QueryServiceStatusEx(hService, SC_STATUS_PROCESS_INFO, (BYTE*)&ssp, sizeof(ssp), &bytesNeeded)) { 127 | PrintError("QueryServiceStatusEx()", GetLastError()); 128 | return -1; 129 | } 130 | } 131 | CloseServiceHandle(hService); 132 | #pragma endregion 133 | 134 | #pragma region duplicate trustedinstaller token 135 | // get pid from service status query 136 | printf("[+] pid of trustedinstaller service: %d\n", ssp.dwProcessId); 137 | // duplicate token 138 | HANDLE hTrustedInstallerToken = DuplicateProcessToken(ssp.dwProcessId, TOKEN_TYPE::TokenPrimary); 139 | if (hTrustedInstallerToken != INVALID_HANDLE_VALUE) printf("[+] process token duplicated\n"); 140 | else { printf("[-] failed to duplicate token\n"); return -1; } 141 | #pragma endregion 142 | 143 | #pragma region stop trustedinstaller service 144 | // stop service by killing process, as it does not accept SERVICE_CONTROL_STOP 145 | if (TerminateProcess(ssp.dwProcessId)) 146 | { 147 | printf("[+] stopped trustedinstaller service\n"); 148 | } 149 | #pragma endregion 150 | 151 | #pragma region stop trustedinstaller process 152 | if (TerminateProcess(GetPidByName(L"TrustedInstaller.exe"))) 153 | { 154 | printf("[+] killed trustedinstaller process\n"); 155 | } 156 | #pragma endregion 157 | 158 | #pragma region create process with trustedinstaller token 159 | // start new process with token 160 | STARTUPINFO si = {}; 161 | PROCESS_INFORMATION pi = {}; 162 | BOOL success = CreateProcessWithTokenW(hTrustedInstallerToken, LOGON_NETCREDENTIALS_ONLY, L"C:\\Windows\\System32\\cmd.exe", NULL, CREATE_NEW_CONSOLE, NULL, NULL, &si, &pi); 163 | if (!success) { 164 | PrintError("CreateProcessWithTokenW()", GetLastError()); 165 | return -1; 166 | } 167 | printf("[+] created cmd process with trustedinstaller token\n"); 168 | CloseHandle(hTrustedInstallerToken); 169 | #pragma endregion 170 | 171 | return 0; 172 | } 173 | 174 | HANDLE GetProcessToken(DWORD pid) { 175 | HANDLE hCurrentProcess = {}; 176 | HANDLE hToken = {}; 177 | // get handle to process 178 | if (pid == 0) 179 | { 180 | hCurrentProcess = GetCurrentProcess(); 181 | } 182 | else 183 | { 184 | hCurrentProcess = OpenProcess(PROCESS_QUERY_LIMITED_INFORMATION, TRUE, pid); 185 | if (!hCurrentProcess) 186 | { 187 | PrintError("OpenProcess()", GetLastError()); 188 | return INVALID_HANDLE_VALUE; 189 | } 190 | } 191 | // get handle to token 192 | if (!OpenProcessToken(hCurrentProcess, TOKEN_ASSIGN_PRIMARY | TOKEN_DUPLICATE | TOKEN_IMPERSONATE | TOKEN_QUERY, &hToken)) 193 | { 194 | PrintError("OpenProcessToken()", GetLastError()); 195 | CloseHandle(hCurrentProcess); 196 | return INVALID_HANDLE_VALUE; 197 | } 198 | CloseHandle(hCurrentProcess); 199 | return hToken; 200 | } 201 | 202 | HANDLE DuplicateProcessToken(DWORD pid, TOKEN_TYPE tokenType) { 203 | // retrieve token 204 | HANDLE hToken = GetProcessToken(pid); 205 | if (hToken == INVALID_HANDLE_VALUE) return INVALID_HANDLE_VALUE; 206 | 207 | // args for DuplicateTokenEx 208 | SECURITY_IMPERSONATION_LEVEL seImpersonateLevel = SecurityImpersonation; 209 | HANDLE hNewToken = {}; 210 | // duplicate the token 211 | if (!DuplicateTokenEx(hToken, MAXIMUM_ALLOWED, NULL, seImpersonateLevel, tokenType, &hNewToken)) { 212 | PrintError("DuplicateTokenEx()", GetLastError()); 213 | CloseHandle(hToken); 214 | return INVALID_HANDLE_VALUE; 215 | } 216 | CloseHandle(hToken); 217 | return hNewToken; 218 | } 219 | 220 | void PrintError(const char* msg, DWORD err) { 221 | if (err == -1) { 222 | // only print message 223 | printf(" [-] %s.", msg); 224 | return; 225 | } 226 | // use winapi formatmessage to retrieve descriptor for error code 227 | wchar_t* msgBuf = nullptr; 228 | FormatMessage(FORMAT_MESSAGE_FROM_SYSTEM | FORMAT_MESSAGE_ALLOCATE_BUFFER | FORMAT_MESSAGE_IGNORE_INSERTS, NULL, err, MAKELANGID(LANG_NEUTRAL, SUBLANG_DEFAULT), (wchar_t*)&msgBuf, 0, NULL); 229 | _bstr_t b(msgBuf); const char* c = b; 230 | // print 231 | printf("[-] %s. err: %d %s", msg, err, c); 232 | LocalFree(msgBuf); 233 | } 234 | 235 | bool GetDebugPrivilege() { 236 | // pretty self explanatory 237 | HANDLE hProcess = GetCurrentProcess(); 238 | HANDLE hToken; 239 | if (OpenProcessToken(hProcess, TOKEN_ADJUST_PRIVILEGES, &hToken)) 240 | { 241 | DWORD errCode = SetPrivilege(hToken, SE_DEBUG_NAME, TRUE); 242 | // if errcode is 0 then operation was successful 243 | return errCode == 0; 244 | } 245 | return false; 246 | } 247 | 248 | DWORD SetPrivilege(HANDLE hToken, LPCTSTR lpszPrivilege, BOOL bEnablePrivilege) { 249 | LUID luid; 250 | // get current values for privilege 251 | if (LookupPrivilegeValueW(NULL, lpszPrivilege, &luid)) 252 | { 253 | TOKEN_PRIVILEGES tp; 254 | memset(&tp, 0, sizeof(tp)); 255 | tp.PrivilegeCount = 1; 256 | tp.Privileges[0].Luid = luid; 257 | // update this field 258 | tp.Privileges[0].Attributes = (bEnablePrivilege) ? SE_PRIVILEGE_ENABLED : 0; 259 | // adjust 260 | AdjustTokenPrivileges(hToken, FALSE, &tp, NULL, (PTOKEN_PRIVILEGES)NULL, (PDWORD)NULL); 261 | } 262 | // return error code. 0 on success 263 | return GetLastError(); 264 | } 265 | 266 | DWORD GetPidByName(const wchar_t* procName) { 267 | DWORD procId = 0; 268 | HANDLE hSnap = CreateToolhelp32Snapshot(TH32CS_SNAPPROCESS, 0); 269 | 270 | if (hSnap != INVALID_HANDLE_VALUE) { 271 | PROCESSENTRY32 procEntry; 272 | memset(&procEntry, 0, sizeof(procEntry)); 273 | procEntry.dwSize = sizeof(procEntry); 274 | // iterate through every process, checking if process name matches target 275 | if (Process32First(hSnap, &procEntry)) { 276 | do { 277 | if (!lstrcmpW(procEntry.szExeFile, procName)) { 278 | procId = procEntry.th32ProcessID; 279 | wprintf(L"[+] found process '%s'. pid: %d\n", procName, procId); 280 | break; 281 | } 282 | } while (Process32Next(hSnap, &procEntry)); 283 | } 284 | } 285 | CloseHandle(hSnap); 286 | return procId; 287 | } 288 | 289 | bool TerminateProcess(DWORD pid) 290 | { 291 | if (pid == 0) return false; 292 | HANDLE hProc = OpenProcess(PROCESS_ALL_ACCESS, FALSE, pid); 293 | if (hProc == INVALID_HANDLE_VALUE) { 294 | PrintError("OpenProcess()", GetLastError()); 295 | return false; 296 | } 297 | bool flag = true; 298 | if (!TerminateProcess(hProc, 1)) { 299 | PrintError("TerminateProcess()", GetLastError()); 300 | flag = false; 301 | } 302 | CloseHandle(hProc); 303 | return flag; 304 | } -------------------------------------------------------------------------------- /LICENSE: -------------------------------------------------------------------------------- 1 | MIT License 2 | 3 | Copyright (c) 2021 wilszdev 4 | 5 | Permission is hereby granted, free of charge, to any person obtaining a copy 6 | of this software and associated documentation files (the "Software"), to deal 7 | in the Software without restriction, including without limitation the rights 8 | to use, copy, modify, merge, publish, distribute, sublicense, and/or sell 9 | copies of the Software, and to permit persons to whom the Software is 10 | furnished to do so, subject to the following conditions: 11 | 12 | The above copyright notice and this permission notice shall be included in all 13 | copies or substantial portions of the Software. 14 | 15 | THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR 16 | IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, 17 | FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE 18 | AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER 19 | LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, 20 | OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE 21 | SOFTWARE. 22 | -------------------------------------------------------------------------------- /README.md: -------------------------------------------------------------------------------- 1 | # GetTrustedInstallerShell 2 | 3 | run as local administrator. 4 | impersonates the trusted installer 5 | --------------------------------------------------------------------------------