setnamedsecurityinfo.py 3.9 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960
  1. import win32security,win32api,win32con, win32process
  2. fname, tmp = win32api.GetTempFileName(win32api.GetTempPath(),'tmp')
  3. print(fname)
  4. ## You need SE_RESTORE_NAME to be able to set the owner of a security descriptor to anybody
  5. ## other than yourself or your primary group. Most admin logins don't have it by default, so
  6. ## enabling it may fail
  7. new_privs = ((win32security.LookupPrivilegeValue('',win32security.SE_SECURITY_NAME),win32con.SE_PRIVILEGE_ENABLED),
  8. (win32security.LookupPrivilegeValue('',win32security.SE_TCB_NAME),win32con.SE_PRIVILEGE_ENABLED),
  9. (win32security.LookupPrivilegeValue('',win32security.SE_SHUTDOWN_NAME),win32con.SE_PRIVILEGE_ENABLED),
  10. (win32security.LookupPrivilegeValue('',win32security.SE_RESTORE_NAME),win32con.SE_PRIVILEGE_ENABLED),
  11. (win32security.LookupPrivilegeValue('',win32security.SE_TAKE_OWNERSHIP_NAME),win32con.SE_PRIVILEGE_ENABLED),
  12. (win32security.LookupPrivilegeValue('',win32security.SE_CREATE_PERMANENT_NAME),win32con.SE_PRIVILEGE_ENABLED),
  13. (win32security.LookupPrivilegeValue('',win32security.SE_ENABLE_DELEGATION_NAME),win32con.SE_PRIVILEGE_ENABLED),
  14. (win32security.LookupPrivilegeValue('',win32security.SE_CHANGE_NOTIFY_NAME),win32con.SE_PRIVILEGE_ENABLED),
  15. (win32security.LookupPrivilegeValue('',win32security.SE_DEBUG_NAME),win32con.SE_PRIVILEGE_ENABLED),
  16. (win32security.LookupPrivilegeValue('',win32security.SE_PROF_SINGLE_PROCESS_NAME),win32con.SE_PRIVILEGE_ENABLED),
  17. (win32security.LookupPrivilegeValue('',win32security.SE_SYSTEM_PROFILE_NAME),win32con.SE_PRIVILEGE_ENABLED),
  18. (win32security.LookupPrivilegeValue('',win32security.SE_LOCK_MEMORY_NAME),win32con.SE_PRIVILEGE_ENABLED)
  19. )
  20. all_info=win32security.OWNER_SECURITY_INFORMATION|win32security.GROUP_SECURITY_INFORMATION| \
  21. win32security.DACL_SECURITY_INFORMATION|win32security.SACL_SECURITY_INFORMATION
  22. ph=win32process.GetCurrentProcess()
  23. th = win32security.OpenProcessToken(ph,win32security.TOKEN_ALL_ACCESS) ##win32con.TOKEN_ADJUST_PRIVILEGES)
  24. win32security.AdjustTokenPrivileges(th,0,new_privs)
  25. my_sid = win32security.GetTokenInformation(th,win32security.TokenUser)[0]
  26. pwr_sid=win32security.LookupAccountName('','Power Users')[0]
  27. sd=win32security.GetNamedSecurityInfo(fname,win32security.SE_FILE_OBJECT,all_info)
  28. dacl=sd.GetSecurityDescriptorDacl()
  29. if dacl is None:
  30. dacl=win32security.ACL()
  31. sacl=sd.GetSecurityDescriptorSacl()
  32. if sacl is None:
  33. sacl=win32security.ACL()
  34. dacl_ace_cnt=dacl.GetAceCount()
  35. sacl_ace_cnt=sacl.GetAceCount()
  36. dacl.AddAccessAllowedAce(dacl.GetAclRevision(),win32con.ACCESS_SYSTEM_SECURITY|win32con.WRITE_DAC,my_sid)
  37. sacl.AddAuditAccessAce(sacl.GetAclRevision(),win32con.GENERIC_ALL,my_sid,1,1)
  38. win32security.SetNamedSecurityInfo(fname,win32security.SE_FILE_OBJECT,all_info,pwr_sid, pwr_sid, dacl, sacl)
  39. new_sd=win32security.GetNamedSecurityInfo(fname,win32security.SE_FILE_OBJECT,all_info)
  40. ## could do additional checking to make sure added ACE contains expected info
  41. if new_sd.GetSecurityDescriptorDacl().GetAceCount()!=dacl_ace_cnt+1:
  42. print('New dacl doesn''t contain extra ace ????')
  43. if new_sd.GetSecurityDescriptorSacl().GetAceCount()!=sacl_ace_cnt+1:
  44. print('New Sacl doesn''t contain extra ace ????')
  45. if win32security.LookupAccountSid('',new_sd.GetSecurityDescriptorOwner())[0]!='Power Users':
  46. print('Owner not successfully set to Power Users !!!!!')
  47. if win32security.LookupAccountSid('',new_sd.GetSecurityDescriptorGroup())[0]!='Power Users':
  48. print('Group not successfully set to Power Users !!!!!')
  49. win32security.SetNamedSecurityInfo(fname,win32security.SE_FILE_OBJECT,win32security.SACL_SECURITY_INFORMATION, None, None, None, None)
  50. new_sd_1=win32security.GetNamedSecurityInfo(fname,win32security.SE_FILE_OBJECT,win32security.SACL_SECURITY_INFORMATION)
  51. if new_sd_1.GetSecurityDescriptorSacl() is not None:
  52. print('Unable to set Sacl to NULL !!!!!!!!')