mirror of
https://github.com/rapid7/metasploit-payloads
synced 2025-02-16 00:24:29 +01:00
Adds the process username to the ps output (when possible).
git-svn-id: file:///home/svn/framework3/trunk@8056 4d416f70-5f16-0410-b530-b9f4589650da
This commit is contained in:
parent
3abb8ddb16
commit
fc341ada59
@ -371,7 +371,7 @@ DWORD request_sys_process_get_processes(Remote *remote, Packet *packet)
|
|||||||
DWORD pids[512], numProcesses, index, needed;
|
DWORD pids[512], numProcesses, index, needed;
|
||||||
DWORD res = ERROR_SUCCESS;
|
DWORD res = ERROR_SUCCESS;
|
||||||
HANDLE psapi = NULL;
|
HANDLE psapi = NULL;
|
||||||
Tlv entries[3];
|
Tlv entries[4];
|
||||||
|
|
||||||
do
|
do
|
||||||
{
|
{
|
||||||
@ -415,12 +415,20 @@ DWORD request_sys_process_get_processes(Remote *remote, Packet *packet)
|
|||||||
index++)
|
index++)
|
||||||
{
|
{
|
||||||
CHAR path[1024], name[256];
|
CHAR path[1024], name[256];
|
||||||
|
CHAR username[512], username_only[512], domainname_only[512];
|
||||||
DWORD pidNbo;
|
DWORD pidNbo;
|
||||||
HMODULE mod;
|
HMODULE mod;
|
||||||
HANDLE p;
|
HANDLE p;
|
||||||
|
LPVOID TokenUserInfo[4096];
|
||||||
|
HANDLE token;
|
||||||
|
DWORD user_length = sizeof(username_only), domain_length = sizeof(domainname_only);
|
||||||
|
DWORD size = sizeof(username), sid_type = 0, returned_tokinfo_length;
|
||||||
|
|
||||||
memset(name, 0, sizeof(name));
|
memset(name, 0, sizeof(name));
|
||||||
memset(path, 0, sizeof(path));
|
memset(path, 0, sizeof(path));
|
||||||
|
memset(username, 0, sizeof(username));
|
||||||
|
memset(username_only, 0, sizeof(username_only));
|
||||||
|
memset(domainname_only, 0, sizeof(domainname_only));
|
||||||
|
|
||||||
// Try to attach to the process for querying information
|
// Try to attach to the process for querying information
|
||||||
if (!(p = OpenProcess(PROCESS_QUERY_INFORMATION | PROCESS_VM_READ,
|
if (!(p = OpenProcess(PROCESS_QUERY_INFORMATION | PROCESS_VM_READ,
|
||||||
@ -436,10 +444,21 @@ DWORD request_sys_process_get_processes(Remote *remote, Packet *packet)
|
|||||||
continue;
|
continue;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// Convert the pid to network byte order
|
||||||
|
pidNbo = htonl(pids[index]);
|
||||||
|
|
||||||
// Try to get the process' file name
|
// Try to get the process' file name
|
||||||
getModuleFileNameEx(p, mod, path, sizeof(path) - 1);
|
getModuleFileNameEx(p, mod, path, sizeof(path) - 1);
|
||||||
|
|
||||||
pidNbo = htonl(pids[index]);
|
// Try to get the process' user name
|
||||||
|
if (OpenProcessToken(p, TOKEN_QUERY, &token)) {
|
||||||
|
if (GetTokenInformation(token, TokenUser, TokenUserInfo, 4096, &returned_tokinfo_length)) {
|
||||||
|
if(LookupAccountSidA(NULL, ((TOKEN_USER*)TokenUserInfo)->User.Sid, username_only, &user_length, domainname_only, &domain_length, (PSID_NAME_USE)&sid_type)) {
|
||||||
|
_snprintf(username, 512, "%s\\%s", domainname_only, username_only);
|
||||||
|
username[511] = '\0';
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
// Initialize the TLV entries
|
// Initialize the TLV entries
|
||||||
entries[0].header.type = TLV_TYPE_PID;
|
entries[0].header.type = TLV_TYPE_PID;
|
||||||
@ -451,10 +470,12 @@ DWORD request_sys_process_get_processes(Remote *remote, Packet *packet)
|
|||||||
entries[2].header.type = TLV_TYPE_PROCESS_PATH;
|
entries[2].header.type = TLV_TYPE_PROCESS_PATH;
|
||||||
entries[2].header.length = strlen(path) + 1;
|
entries[2].header.length = strlen(path) + 1;
|
||||||
entries[2].buffer = path;
|
entries[2].buffer = path;
|
||||||
|
entries[3].header.type = TLV_TYPE_USER_NAME;
|
||||||
|
entries[3].header.length = strlen(username) + 1;
|
||||||
|
entries[3].buffer = username;
|
||||||
|
|
||||||
// Add the packet group entry for this item
|
// Add the packet group entry for this item
|
||||||
packet_add_tlv_group(response, TLV_TYPE_PROCESS_GROUP,
|
packet_add_tlv_group(response, TLV_TYPE_PROCESS_GROUP, entries, 4);
|
||||||
entries, 3);
|
|
||||||
|
|
||||||
CloseHandle(p);
|
CloseHandle(p);
|
||||||
}
|
}
|
||||||
|
Loading…
Reference in New Issue
Block a user