diff options
Diffstat (limited to 'source4/rpcclient/cmd_lsarpc.c')
-rw-r--r-- | source4/rpcclient/cmd_lsarpc.c | 760 |
1 files changed, 0 insertions, 760 deletions
diff --git a/source4/rpcclient/cmd_lsarpc.c b/source4/rpcclient/cmd_lsarpc.c deleted file mode 100644 index fab6a89ed5..0000000000 --- a/source4/rpcclient/cmd_lsarpc.c +++ /dev/null @@ -1,760 +0,0 @@ -/* - Unix SMB/CIFS implementation. - RPC pipe client - - Copyright (C) Tim Potter 2000 - Copyright (C) Rafal Szczesniak 2002 - - This program is free software; you can redistribute it and/or modify - it under the terms of the GNU General Public License as published by - the Free Software Foundation; either version 2 of the License, or - (at your option) any later version. - - This program is distributed in the hope that it will be useful, - but WITHOUT ANY WARRANTY; without even the implied warranty of - MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the - GNU General Public License for more details. - - You should have received a copy of the GNU General Public License - along with this program; if not, write to the Free Software - Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA. -*/ - -#include "includes.h" -#include "rpcclient.h" - - -/* useful function to allow entering a name instead of a SID and - * looking it up automatically */ -static NTSTATUS name_to_sid(struct cli_state *cli, - TALLOC_CTX *mem_ctx, - DOM_SID *sid, const char *name) -{ - POLICY_HND pol; - uint32 *sid_types; - NTSTATUS result; - DOM_SID *sids; - - /* maybe its a raw SID */ - if (strncmp(name, "S-", 2) == 0 && - string_to_sid(sid, name)) { - return NT_STATUS_OK; - } - - result = cli_lsa_open_policy(cli, mem_ctx, True, - SEC_RIGHTS_MAXIMUM_ALLOWED, - &pol); - if (!NT_STATUS_IS_OK(result)) - goto done; - - result = cli_lsa_lookup_names(cli, mem_ctx, &pol, 1, &name, &sids, &sid_types); - if (!NT_STATUS_IS_OK(result)) - goto done; - - cli_lsa_close(cli, mem_ctx, &pol); - - *sid = sids[0]; - -done: - return result; -} - - -/* Look up domain related information on a remote host */ - -static NTSTATUS cmd_lsa_query_info_policy(struct cli_state *cli, - TALLOC_CTX *mem_ctx, int argc, - const char **argv) -{ - POLICY_HND pol; - NTSTATUS result = NT_STATUS_UNSUCCESSFUL; - DOM_SID dom_sid; - GUID dom_guid; - fstring sid_str, domain_name="", dns_name="", forest_name=""; - uint32 info_class = 3; - - if (argc > 2) { - printf("Usage: %s [info_class]\n", argv[0]); - return NT_STATUS_OK; - } - - if (argc == 2) - info_class = atoi(argv[1]); - - /* Lookup info policy */ - switch (info_class) { - case 12: - result = cli_lsa_open_policy2(cli, mem_ctx, True, - SEC_RIGHTS_MAXIMUM_ALLOWED, - &pol); - - if (!NT_STATUS_IS_OK(result)) - goto done; - result = cli_lsa_query_info_policy2(cli, mem_ctx, &pol, - info_class, domain_name, - dns_name, forest_name, - &dom_guid, &dom_sid); - break; - default: - result = cli_lsa_open_policy(cli, mem_ctx, True, - SEC_RIGHTS_MAXIMUM_ALLOWED, - &pol); - - if (!NT_STATUS_IS_OK(result)) - goto done; - result = cli_lsa_query_info_policy(cli, mem_ctx, &pol, - info_class, domain_name, - &dom_sid); - } - - if (!NT_STATUS_IS_OK(result)) - goto done; - - sid_to_string(sid_str, &dom_sid); - - if (domain_name[0]) - printf("domain %s has sid %s\n", domain_name, sid_str); - else - printf("could not query info for level %d\n", info_class); - - if (dns_name[0]) - printf("domain dns name is %s\n", dns_name); - if (forest_name[0]) - printf("forest name is %s\n", forest_name); - - if (info_class == 12) { - printf("domain GUID is "); - print_guid(&dom_guid); - } - done: - return result; -} - -/* Resolve a list of names to a list of sids */ - -static NTSTATUS cmd_lsa_lookup_names(struct cli_state *cli, - TALLOC_CTX *mem_ctx, int argc, - const char **argv) -{ - POLICY_HND pol; - NTSTATUS result = NT_STATUS_UNSUCCESSFUL; - DOM_SID *sids; - uint32 *types; - int i; - - if (argc == 1) { - printf("Usage: %s [name1 [name2 [...]]]\n", argv[0]); - return NT_STATUS_OK; - } - - result = cli_lsa_open_policy(cli, mem_ctx, True, - SEC_RIGHTS_MAXIMUM_ALLOWED, - &pol); - - if (!NT_STATUS_IS_OK(result)) - goto done; - - result = cli_lsa_lookup_names(cli, mem_ctx, &pol, argc - 1, - (const char**)(argv + 1), &sids, &types); - - if (!NT_STATUS_IS_OK(result) && NT_STATUS_V(result) != - NT_STATUS_V(STATUS_SOME_UNMAPPED)) - goto done; - - result = NT_STATUS_OK; - - /* Print results */ - - for (i = 0; i < (argc - 1); i++) { - fstring sid_str; - sid_to_string(sid_str, &sids[i]); - printf("%s %s (%s: %d)\n", argv[i + 1], sid_str, - sid_type_lookup(types[i]), types[i]); - } - - done: - return result; -} - -/* Resolve a list of SIDs to a list of names */ - -static NTSTATUS cmd_lsa_lookup_sids(struct cli_state *cli, TALLOC_CTX *mem_ctx, - int argc, const char **argv) -{ - POLICY_HND pol; - NTSTATUS result = NT_STATUS_UNSUCCESSFUL; - DOM_SID *sids; - char **domains; - char **names; - uint32 *types; - int i; - - if (argc == 1) { - printf("Usage: %s [sid1 [sid2 [...]]]\n", argv[0]); - return NT_STATUS_OK; - } - - result = cli_lsa_open_policy(cli, mem_ctx, True, - SEC_RIGHTS_MAXIMUM_ALLOWED, - &pol); - - if (!NT_STATUS_IS_OK(result)) - goto done; - - /* Convert arguments to sids */ - - sids = (DOM_SID *)talloc(mem_ctx, sizeof(DOM_SID) * (argc - 1)); - - if (!sids) { - printf("could not allocate memory for %d sids\n", argc - 1); - goto done; - } - - for (i = 0; i < argc - 1; i++) - if (!string_to_sid(&sids[i], argv[i + 1])) { - result = NT_STATUS_INVALID_SID; - goto done; - } - - /* Lookup the SIDs */ - - result = cli_lsa_lookup_sids(cli, mem_ctx, &pol, argc - 1, sids, - &domains, &names, &types); - - if (!NT_STATUS_IS_OK(result) && NT_STATUS_V(result) != - NT_STATUS_V(STATUS_SOME_UNMAPPED)) - goto done; - - result = NT_STATUS_OK; - - /* Print results */ - - for (i = 0; i < (argc - 1); i++) { - fstring sid_str; - - sid_to_string(sid_str, &sids[i]); - printf("%s %s\\%s (%d)\n", sid_str, - domains[i] ? domains[i] : "*unknown*", - names[i] ? names[i] : "*unknown*", types[i]); - } - - done: - return result; -} - -/* Enumerate list of trusted domains */ - -static NTSTATUS cmd_lsa_enum_trust_dom(struct cli_state *cli, - TALLOC_CTX *mem_ctx, int argc, - const char **argv) -{ - POLICY_HND pol; - NTSTATUS result = NT_STATUS_UNSUCCESSFUL; - DOM_SID *domain_sids; - char **domain_names; - - /* defaults, but may be changed using params */ - uint32 enum_ctx = 0; - uint32 num_domains = 0; - int i; - - if (argc > 2) { - printf("Usage: %s [enum context (0)]\n", argv[0]); - return NT_STATUS_OK; - } - - if (argc == 2 && argv[1]) { - enum_ctx = atoi(argv[2]); - } - - result = cli_lsa_open_policy(cli, mem_ctx, True, - POLICY_VIEW_LOCAL_INFORMATION, - &pol); - - if (!NT_STATUS_IS_OK(result)) - goto done; - - /* Lookup list of trusted domains */ - - result = cli_lsa_enum_trust_dom(cli, mem_ctx, &pol, &enum_ctx, - &num_domains, - &domain_names, &domain_sids); - if (!NT_STATUS_IS_OK(result) && - !NT_STATUS_EQUAL(result, NT_STATUS_NO_MORE_ENTRIES) && - !NT_STATUS_EQUAL(result, STATUS_MORE_ENTRIES)) - goto done; - - /* Print results: list of names and sids returned in this response. */ - for (i = 0; i < num_domains; i++) { - fstring sid_str; - - sid_to_string(sid_str, &domain_sids[i]); - printf("%s %s\n", domain_names[i] ? domain_names[i] : - "*unknown*", sid_str); - } - - done: - return result; -} - -/* Enumerates privileges */ - -static NTSTATUS cmd_lsa_enum_privilege(struct cli_state *cli, - TALLOC_CTX *mem_ctx, int argc, - const char **argv) -{ - POLICY_HND pol; - NTSTATUS result = NT_STATUS_UNSUCCESSFUL; - - uint32 enum_context=0; - uint32 pref_max_length=0x1000; - uint32 count=0; - char **privs_name; - uint32 *privs_high; - uint32 *privs_low; - int i; - - if (argc > 3) { - printf("Usage: %s [enum context] [max length]\n", argv[0]); - return NT_STATUS_OK; - } - - if (argc>=2) - enum_context=atoi(argv[1]); - - if (argc==3) - pref_max_length=atoi(argv[2]); - - result = cli_lsa_open_policy(cli, mem_ctx, True, - SEC_RIGHTS_MAXIMUM_ALLOWED, - &pol); - - if (!NT_STATUS_IS_OK(result)) - goto done; - - result = cli_lsa_enum_privilege(cli, mem_ctx, &pol, &enum_context, pref_max_length, - &count, &privs_name, &privs_high, &privs_low); - - if (!NT_STATUS_IS_OK(result)) - goto done; - - /* Print results */ - printf("found %d privileges\n\n", count); - - for (i = 0; i < count; i++) { - printf("%s \t\t%d:%d (0x%x:0x%x)\n", privs_name[i] ? privs_name[i] : "*unknown*", - privs_high[i], privs_low[i], privs_high[i], privs_low[i]); - } - - done: - return result; -} - -/* Get privilege name */ - -static NTSTATUS cmd_lsa_get_dispname(struct cli_state *cli, - TALLOC_CTX *mem_ctx, int argc, - const char **argv) -{ - POLICY_HND pol; - NTSTATUS result = NT_STATUS_UNSUCCESSFUL; - - uint16 lang_id=0; - uint16 lang_id_sys=0; - uint16 lang_id_desc; - fstring description; - - if (argc != 2) { - printf("Usage: %s privilege name\n", argv[0]); - return NT_STATUS_OK; - } - - result = cli_lsa_open_policy(cli, mem_ctx, True, - SEC_RIGHTS_MAXIMUM_ALLOWED, - &pol); - - if (!NT_STATUS_IS_OK(result)) - goto done; - - result = cli_lsa_get_dispname(cli, mem_ctx, &pol, argv[1], lang_id, lang_id_sys, description, &lang_id_desc); - - if (!NT_STATUS_IS_OK(result)) - goto done; - - /* Print results */ - printf("%s -> %s (language: 0x%x)\n", argv[1], description, lang_id_desc); - - done: - return result; -} - -/* Enumerate the LSA SIDS */ - -static NTSTATUS cmd_lsa_enum_sids(struct cli_state *cli, - TALLOC_CTX *mem_ctx, int argc, - const char **argv) -{ - POLICY_HND pol; - NTSTATUS result = NT_STATUS_UNSUCCESSFUL; - - uint32 enum_context=0; - uint32 pref_max_length=0x1000; - DOM_SID *sids; - uint32 count=0; - int i; - - if (argc > 3) { - printf("Usage: %s [enum context] [max length]\n", argv[0]); - return NT_STATUS_OK; - } - - if (argc>=2) - enum_context=atoi(argv[1]); - - if (argc==3) - pref_max_length=atoi(argv[2]); - - result = cli_lsa_open_policy(cli, mem_ctx, True, - SEC_RIGHTS_MAXIMUM_ALLOWED, - &pol); - - if (!NT_STATUS_IS_OK(result)) - goto done; - - result = cli_lsa_enum_sids(cli, mem_ctx, &pol, &enum_context, pref_max_length, - &count, &sids); - - if (!NT_STATUS_IS_OK(result)) - goto done; - - /* Print results */ - printf("found %d SIDs\n\n", count); - - for (i = 0; i < count; i++) { - fstring sid_str; - - sid_to_string(sid_str, &sids[i]); - printf("%s\n", sid_str); - } - - done: - return result; -} - -/* Enumerate the privileges of an SID */ - -static NTSTATUS cmd_lsa_enum_privsaccounts(struct cli_state *cli, - TALLOC_CTX *mem_ctx, int argc, - const char **argv) -{ - POLICY_HND dom_pol; - POLICY_HND user_pol; - NTSTATUS result = NT_STATUS_UNSUCCESSFUL; - uint32 access_desired = 0x000f000f; - - DOM_SID sid; - uint32 count=0; - LUID_ATTR *set; - int i; - - if (argc != 2 ) { - printf("Usage: %s SID\n", argv[0]); - return NT_STATUS_OK; - } - - result = name_to_sid(cli, mem_ctx, &sid, argv[1]); - if (!NT_STATUS_IS_OK(result)) - goto done; - - result = cli_lsa_open_policy2(cli, mem_ctx, True, - SEC_RIGHTS_MAXIMUM_ALLOWED, - &dom_pol); - - if (!NT_STATUS_IS_OK(result)) - goto done; - - result = cli_lsa_open_account(cli, mem_ctx, &dom_pol, &sid, access_desired, &user_pol); - - if (!NT_STATUS_IS_OK(result)) - goto done; - - result = cli_lsa_enum_privsaccount(cli, mem_ctx, &user_pol, &count, &set); - - if (!NT_STATUS_IS_OK(result)) - goto done; - - /* Print results */ - printf("found %d privileges for SID %s\n\n", count, argv[1]); - printf("high\tlow\tattribute\n"); - - for (i = 0; i < count; i++) { - printf("%u\t%u\t%u\n", set[i].luid.high, set[i].luid.low, set[i].attr); - } - - done: - return result; -} - - -/* Enumerate the privileges of an SID via LsaEnumerateAccountRights */ - -static NTSTATUS cmd_lsa_enum_acct_rights(struct cli_state *cli, - TALLOC_CTX *mem_ctx, int argc, - const char **argv) -{ - POLICY_HND dom_pol; - NTSTATUS result = NT_STATUS_UNSUCCESSFUL; - - DOM_SID sid; - uint32 count; - char **rights; - - int i; - - if (argc != 2 ) { - printf("Usage: %s SID\n", argv[0]); - return NT_STATUS_OK; - } - - result = name_to_sid(cli, mem_ctx, &sid, argv[1]); - if (!NT_STATUS_IS_OK(result)) - goto done; - - result = cli_lsa_open_policy2(cli, mem_ctx, True, - SEC_RIGHTS_MAXIMUM_ALLOWED, - &dom_pol); - - if (!NT_STATUS_IS_OK(result)) - goto done; - - result = cli_lsa_enum_account_rights(cli, mem_ctx, &dom_pol, sid, &count, &rights); - - if (!NT_STATUS_IS_OK(result)) - goto done; - - printf("found %d privileges for SID %s\n", count, sid_string_static(&sid)); - - for (i = 0; i < count; i++) { - printf("\t%s\n", rights[i]); - } - - done: - return result; -} - - -/* Enumerate the accounts with a specific right */ - -static NTSTATUS cmd_lsa_enum_acct_with_right(struct cli_state *cli, - TALLOC_CTX *mem_ctx, int argc, - const char **argv) -{ - POLICY_HND dom_pol; - NTSTATUS result = NT_STATUS_UNSUCCESSFUL; - DOM_SID *sids; - uint32 count; - const char *right; - - int i; - - if (argc != 2 ) { - printf("Usage: %s <RIGHT>\n", argv[0]); - return NT_STATUS_OK; - } - - right = argv[1]; - - result = cli_lsa_open_policy2(cli, mem_ctx, True, - SEC_RIGHTS_MAXIMUM_ALLOWED, - &dom_pol); - - if (!NT_STATUS_IS_OK(result)) - goto done; - - result = cli_lsa_enum_account_with_right(cli, mem_ctx, &dom_pol, right, &count, &sids); - - if (!NT_STATUS_IS_OK(result)) - goto done; - - printf("found %d SIDs for '%s'\n", count, right); - - for (i = 0; i < count; i++) { - printf("\t%s\n", sid_string_static(&sids[i])); - } - - done: - return result; -} - - -/* add some privileges to a SID via LsaAddAccountRights */ - -static NTSTATUS cmd_lsa_add_acct_rights(struct cli_state *cli, - TALLOC_CTX *mem_ctx, int argc, - const char **argv) -{ - POLICY_HND dom_pol; - NTSTATUS result = NT_STATUS_UNSUCCESSFUL; - - DOM_SID sid; - - if (argc < 3 ) { - printf("Usage: %s SID [rights...]\n", argv[0]); - return NT_STATUS_OK; - } - - result = name_to_sid(cli, mem_ctx, &sid, argv[1]); - if (!NT_STATUS_IS_OK(result)) - goto done; - - result = cli_lsa_open_policy2(cli, mem_ctx, True, - SEC_RIGHTS_MAXIMUM_ALLOWED, - &dom_pol); - - if (!NT_STATUS_IS_OK(result)) - goto done; - - result = cli_lsa_add_account_rights(cli, mem_ctx, &dom_pol, sid, - argc-2, argv+2); - - if (!NT_STATUS_IS_OK(result)) - goto done; - - done: - return result; -} - - -/* remove some privileges to a SID via LsaRemoveAccountRights */ - -static NTSTATUS cmd_lsa_remove_acct_rights(struct cli_state *cli, - TALLOC_CTX *mem_ctx, int argc, - const char **argv) -{ - POLICY_HND dom_pol; - NTSTATUS result = NT_STATUS_UNSUCCESSFUL; - - DOM_SID sid; - - if (argc < 3 ) { - printf("Usage: %s SID [rights...]\n", argv[0]); - return NT_STATUS_OK; - } - - result = name_to_sid(cli, mem_ctx, &sid, argv[1]); - if (!NT_STATUS_IS_OK(result)) - goto done; - - result = cli_lsa_open_policy2(cli, mem_ctx, True, - SEC_RIGHTS_MAXIMUM_ALLOWED, - &dom_pol); - - if (!NT_STATUS_IS_OK(result)) - goto done; - - result = cli_lsa_remove_account_rights(cli, mem_ctx, &dom_pol, sid, - False, argc-2, argv+2); - - if (!NT_STATUS_IS_OK(result)) - goto done; - - done: - return result; -} - - -/* Get a privilege value given its name */ - -static NTSTATUS cmd_lsa_lookupprivvalue(struct cli_state *cli, - TALLOC_CTX *mem_ctx, int argc, - const char **argv) -{ - POLICY_HND pol; - NTSTATUS result = NT_STATUS_UNSUCCESSFUL; - LUID luid; - - if (argc != 2 ) { - printf("Usage: %s name\n", argv[0]); - return NT_STATUS_OK; - } - - result = cli_lsa_open_policy2(cli, mem_ctx, True, - SEC_RIGHTS_MAXIMUM_ALLOWED, - &pol); - - if (!NT_STATUS_IS_OK(result)) - goto done; - - result = cli_lsa_lookupprivvalue(cli, mem_ctx, &pol, argv[1], &luid); - - if (!NT_STATUS_IS_OK(result)) - goto done; - - /* Print results */ - - printf("%u:%u (0x%x:0x%x)\n", luid.high, luid.low, luid.high, luid.low); - - done: - return result; -} - -/* Query LSA security object */ - -static NTSTATUS cmd_lsa_query_secobj(struct cli_state *cli, - TALLOC_CTX *mem_ctx, int argc, - const char **argv) -{ - POLICY_HND pol; - NTSTATUS result = NT_STATUS_UNSUCCESSFUL; - SEC_DESC_BUF *sdb; - uint32 sec_info = 0x00000004; /* ??? */ - - if (argc != 1 ) { - printf("Usage: %s\n", argv[0]); - return NT_STATUS_OK; - } - - result = cli_lsa_open_policy2(cli, mem_ctx, True, - SEC_RIGHTS_MAXIMUM_ALLOWED, - &pol); - - if (!NT_STATUS_IS_OK(result)) - goto done; - - result = cli_lsa_query_secobj(cli, mem_ctx, &pol, sec_info, &sdb); - - if (!NT_STATUS_IS_OK(result)) - goto done; - - /* Print results */ - - display_sec_desc(sdb->sec); - - done: - return result; -} - - -/* List of commands exported by this module */ - -struct cmd_set lsarpc_commands[] = { - - { "LSARPC" }, - - { "lsaquery", cmd_lsa_query_info_policy, PI_LSARPC, "Query info policy", "" }, - { "lookupsids", cmd_lsa_lookup_sids, PI_LSARPC, "Convert SIDs to names", "" }, - { "lookupnames", cmd_lsa_lookup_names, PI_LSARPC, "Convert names to SIDs", "" }, - { "enumtrust", cmd_lsa_enum_trust_dom, PI_LSARPC, "Enumerate trusted domains", "Usage: [preferred max number] [enum context (0)]" }, - { "enumprivs", cmd_lsa_enum_privilege, PI_LSARPC, "Enumerate privileges", "" }, - { "getdispname", cmd_lsa_get_dispname, PI_LSARPC, "Get the privilege name", "" }, - { "lsaenumsid", cmd_lsa_enum_sids, PI_LSARPC, "Enumerate the LSA SIDS", "" }, - { "lsaenumprivsaccount", cmd_lsa_enum_privsaccounts, PI_LSARPC, "Enumerate the privileges of an SID", "" }, - { "lsaenumacctrights", cmd_lsa_enum_acct_rights, PI_LSARPC, "Enumerate the rights of an SID", "" }, - { "lsaenumacctwithright",cmd_lsa_enum_acct_with_right,PI_LSARPC,"Enumerate accounts with a right", "" }, - { "lsaaddacctrights", cmd_lsa_add_acct_rights, PI_LSARPC, "Add rights to an account", "" }, - { "lsaremoveacctrights", cmd_lsa_remove_acct_rights, PI_LSARPC, "Remove rights from an account", "" }, - { "lsalookupprivvalue", cmd_lsa_lookupprivvalue, PI_LSARPC, "Get a privilege value given its name", "" }, - { "lsaquerysecobj", cmd_lsa_query_secobj, PI_LSARPC, "Query LSA security object", "" }, - - { NULL } -}; |