|
|
Note: Some code sample may need to be
tested in the domain-based, active directory environment, private or public
in order to see the 'real' output samples. Ask your lab's instructor to
use the appropriate lab. This tutorial exposes some part of the Windows
'security' implementation.
What do we have in this session?
-
Access Control
Access Control Model
Access Control Components
-
Security Descriptors
Securable Objects
-
Access Control Entries (ACEs)
Object-specific ACEs
Trustees
-
ACCESS_MASK Data Type
Access Mask format
Generic Access Rights
Standard Access Rights
SACL Access Right
Directory Services Access Rights
How Security Descriptors are Set on New Directory Objects
Default Security Descriptor
-
Interaction Between Threads and Securable Objects
DACLs and ACEs
How DACLs Control Access to an Object
Order of ACEs in a DACL
ACEs to Control Access to an Object's Properties
-
Null DACLs and Empty DACLs
Allowing Anonymous Access
Security Descriptor Definition Language (SDDL)
Security Descriptor String Format
Security Descriptor String Examples
String 1 example
String 2 example
-
The ACE String Description
-
-
More on SID Components
-
-
Running with Special Privileges
Running with Administrator Privileges
Asking the User for Credentials
Acquiring user credentials
Changing Privileges in a Token
Enabling and Disabling Privileges
-
Privilege Constants
-
SACL Access Right
Auditing Access To Private Objects
Low-level Access Control
Low-level Security Descriptor Functions
Low-level Security Descriptor Creation
Absolute and Self-Relative Security Descriptors
Low-level ACL and ACE Functions
-
Impersonation
Access Tokens for Impersonation
Client Impersonation
Impersonation Levels
Setting the Impersonation Level
Registry Key Security and Access Rights
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
|