-
Notifications
You must be signed in to change notification settings - Fork 3
/
symlink.c
185 lines (145 loc) · 4.67 KB
/
symlink.c
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
/*
* Copyright (c) 2004 Security Architects Corporation. All rights reserved.
*
* Module Name:
*
* symlink.c
*
* Abstract:
*
* This module implements various symbolic link object hooking routines.
*
* Author:
*
* Eugene Tsyrklevich 25-Mar-2004
*
* Revision History:
*
* None.
*/
#include "symlink.h"
#include "media.h"
#ifdef ALLOC_PRAGMA
#pragma alloc_text (INIT, InitSymlinkHooks)
#endif
fpZwCreateSymbolicLinkObject OriginalNtCreateSymbolicLinkObject = NULL;
fpZwOpenSymbolicLinkObject OriginalNtOpenSymbolicLinkObject = NULL;
/*
* HookedNtCreateSymbolicLinkObject()
*
* Description:
* This function mediates the NtCreateSymbolicLinkObject() system service and checks the
* provided symbolic link object name against the global and current process security policies.
*
* NOTE: ZwCreateSymbolicLinkObject creates or opens a symbolic link object. [NAR]
*
* Parameters:
* Those of NtCreateSymbolicLinkObject().
*
* Returns:
* STATUS_ACCESS_DENIED if the call does not pass the security policy check.
* Otherwise, NTSTATUS returned by NtCreateSymbolicLinkObject().
*/
NTSTATUS
NTAPI
HookedNtCreateSymbolicLinkObject
(
OUT PHANDLE SymbolicLinkHandle,
IN ACCESS_MASK DesiredAccess,
IN POBJECT_ATTRIBUTES ObjectAttributes,
IN PUNICODE_STRING TargetName
)
{
PCHAR FunctionName = "HookedNtCreateSymbolicLinkObject";
CHAR SYMLINKNAME[MAX_PATH];
HOOK_ROUTINE_ENTER();
if (LearningMode == FALSE && GetPathFromOA(ObjectAttributes, SYMLINKNAME, MAX_PATH, RESOLVE_LINKS))
{
/* TargetName is not verified to be valid but it's ok as we don't use it for anything but printing (in debugging mode only) */
if (TargetName)
LOG(LOG_SS_SYMLINK, LOG_PRIORITY_VERBOSE, ("%d HookedNtCreateSymbolicLinkObject: %s -> %S\n", (ULONG) PsGetCurrentProcessId(), SYMLINKNAME, TargetName->Buffer));
else
LOG(LOG_SS_SYMLINK, LOG_PRIORITY_VERBOSE, ("%d HookedNtCreateSymbolicLinkObject: %s ->.\n", (ULONG) PsGetCurrentProcessId(), SYMLINKNAME));
POLICY_CHECK_OPTYPE_NAME(SYMLINK, Get_SYMLINK_OperationType(DesiredAccess));
}
ASSERT(OriginalNtCreateSymbolicLinkObject);
rc = OriginalNtCreateSymbolicLinkObject(SymbolicLinkHandle, DesiredAccess, ObjectAttributes, TargetName);
#if HOOK_MEDIA
/* removable media hook */
if (LearningMode == FALSE && NT_SUCCESS(rc) && KeGetPreviousMode() == KernelMode)
{
MonitorDriveLinks(SYMLINKNAME);
}
#endif
HOOK_ROUTINE_FINISH(SYMLINK);
}
/*
* HookedNtOpenSymbolicLinkObject()
*
* Description:
* This function mediates the NtOpenSymbolicLinkObject() system service and checks the
* provided symbolic link object name against the global and current process security policies.
*
* NOTE: ZwOpenSymbolicLinkObject opens a symbolic link object. [NAR]
*
* Parameters:
* Those of NtOpenSymbolicLinkObject().
*
* Returns:
* STATUS_ACCESS_DENIED if the call does not pass the security policy check.
* Otherwise, NTSTATUS returned by NtOpenSymbolicLinkObject().
*/
NTSTATUS
NTAPI
HookedNtOpenSymbolicLinkObject
(
OUT PHANDLE SymbolicLinkHandle,
IN ACCESS_MASK DesiredAccess,
IN POBJECT_ATTRIBUTES ObjectAttributes
)
{
PCHAR FunctionName = "HookedNtOpenSymbolicLinkObject";
CHAR SYMLINKNAME[MAX_PATH];
HOOK_ROUTINE_ENTER();
/* Cannot use RESOLVE_LINKS! (to avoid infinite recursion) */
if (LearningMode == FALSE && GetPathFromOA(ObjectAttributes, SYMLINKNAME, MAX_PATH, DO_NOT_RESOLVE_LINKS))
{
POLICY_CHECK_OPTYPE_NAME(SYMLINK, Get_SYMLINK_OperationType(DesiredAccess));
}
ASSERT(OriginalNtOpenSymbolicLinkObject);
rc = OriginalNtOpenSymbolicLinkObject(SymbolicLinkHandle, DesiredAccess, ObjectAttributes);
HOOK_ROUTINE_FINISH(SYMLINK);
}
/*
* InitSymlinkHooks()
*
* Description:
* Initializes all the mediated symbolic link object operation pointers. The "OriginalFunction" pointers
* are initialized by InstallSyscallsHooks() that must be called prior to this function.
*
* NOTE: Called once during driver initialization (DriverEntry()).
*
* Parameters:
* None.
*
* Returns:
* TRUE to indicate success, FALSE if failed.
*/
BOOLEAN
InitSymlinkHooks()
{
if ( (OriginalNtCreateSymbolicLinkObject = (fpZwCreateSymbolicLinkObject) ZwCalls[ZW_CREATE_SYMLINK_INDEX].OriginalFunction) == NULL)
{
LOG(LOG_SS_SYMLINK, LOG_PRIORITY_DEBUG, ("InitSymlinkHooks: OriginalNtCreateSymbolicLinkObject is NULL\n"));
return FALSE;
}
/*
disabled due to performance issues - this function is called by every system call (from ResolveFilename)
if ( (OriginalNtOpenSymbolicLinkObject = (fpZwOpenSymbolicLinkObject) ZwCalls[ZW_OPEN_SYMLINK_INDEX].OriginalFunction) == NULL)
{
LOG(LOG_SS_SYMLINK, LOG_PRIORITY_DEBUG, ("InitSymlinkHooks: OriginalNtOpenSymbolicLinkObject is NULL\n"));
return FALSE;
}
*/
return TRUE;
}